Overview
overview
10Static
static
10Malware-1-...30.exe
windows11-21h2-x64
10Malware-1-...40.exe
windows11-21h2-x64
10Malware-1-...32.exe
windows11-21h2-x64
10Malware-1-.../5.exe
windows11-21h2-x64
10Malware-1-...91.exe
windows11-21h2-x64
10Malware-1-...ey.exe
windows11-21h2-x64
7Malware-1-...ad.exe
windows11-21h2-x64
3Malware-1-...ti.exe
windows11-21h2-x64
5Malware-1-...an.bat
windows11-21h2-x64
7Malware-1-...an.exe
windows11-21h2-x64
5Malware-1-...ve.bat
windows11-21h2-x64
7Malware-1-...ve.exe
windows11-21h2-x64
6Malware-1-...ya.exe
windows11-21h2-x64
Malware-1-...re.exe
windows11-21h2-x64
10Malware-1-...ry.exe
windows11-21h2-x64
10Malware-1-...ck.exe
windows11-21h2-x64
3Malware-1-...he.exe
windows11-21h2-x64
10Malware-1-...op.exe
windows11-21h2-x64
7Malware-1-...rb.exe
windows11-21h2-x64
10Malware-1-...ue.exe
windows11-21h2-x64
1Malware-1-...ng.exe
windows11-21h2-x64
6Malware-1-...kt.bat
windows11-21h2-x64
7Malware-1-...o3.exe
windows11-21h2-x64
10Malware-1-...ey.exe
windows11-21h2-x64
10Malware-1-.../m.exe
windows11-21h2-x64
Malware-1-...o3.exe
windows11-21h2-x64
9Malware-1-...32.exe
windows11-21h2-x64
10Malware-1-...nf.exe
windows11-21h2-x64
10Malware-1-.../o.exe
windows11-21h2-x64
3Malware-1-...B8.exe
windows11-21h2-x64
10Malware-1-...ig.exe
windows11-21h2-x64
10Malware-1-...rv.exe
windows11-21h2-x64
10Analysis
-
max time kernel
899s -
max time network
901s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
16/01/2025, 13:33
Behavioral task
behavioral1
Sample
Malware-1-master/2530.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Malware-1-master/2887140.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Malware-1-master/32.exe
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
Malware-1-master/5.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
Malware-1-master/96591.exe
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
Malware-1-master/Amadey.exe
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
Malware-1-master/Download.exe
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
Malware-1-master/Illuminati.exe
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
Malware-1-master/MEMZ-Clean.bat
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
Malware-1-master/MEMZ-Clean.exe
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
Malware-1-master/MEMZ-Destructive.bat
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
Malware-1-master/MEMZ-Destructive.exe
Resource
win11-20241023-en
Behavioral task
behavioral13
Sample
Malware-1-master/Petya.exe
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
Malware-1-master/Software.exe
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
Malware-1-master/WannaCry.exe
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
Malware-1-master/Win32.EvilClusterFuck.exe
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
Malware-1-master/apache.exe
Resource
win11-20241007-en
Behavioral task
behavioral18
Sample
Malware-1-master/butterflyondesktop.exe
Resource
win11-20241023-en
Behavioral task
behavioral19
Sample
Malware-1-master/crb.exe
Resource
win11-20241007-en
Behavioral task
behavioral20
Sample
Malware-1-master/eternalblue.exe
Resource
win11-20241007-en
Behavioral task
behavioral21
Sample
Malware-1-master/fear.png.exe
Resource
win11-20241007-en
Behavioral task
behavioral22
Sample
Malware-1-master/getr3kt.bat
Resource
win11-20241007-en
Behavioral task
behavioral23
Sample
Malware-1-master/iimo3.exe
Resource
win11-20241007-en
Behavioral task
behavioral24
Sample
Malware-1-master/jey.exe
Resource
win11-20241007-en
Behavioral task
behavioral25
Sample
Malware-1-master/m.exe
Resource
win11-20241007-en
Behavioral task
behavioral26
Sample
Malware-1-master/mo3.exe
Resource
win11-20241007-en
Behavioral task
behavioral27
Sample
Malware-1-master/mo332.exe
Resource
win11-20241007-en
Behavioral task
behavioral28
Sample
Malware-1-master/mysqlconf.exe
Resource
win11-20241007-en
Behavioral task
behavioral29
Sample
Malware-1-master/o.exe
Resource
win11-20241007-en
Behavioral task
behavioral30
Sample
Malware-1-master/qOA7iZJcoB8.exe
Resource
win11-20241007-en
Behavioral task
behavioral31
Sample
Malware-1-master/rig.exe
Resource
win11-20241007-en
Behavioral task
behavioral32
Sample
Malware-1-master/sserv.exe
Resource
win11-20241007-en
General
-
Target
Malware-1-master/getr3kt.bat
-
Size
13KB
-
MD5
4e2a7f369378a76d1df4d8c448f712af
-
SHA1
1192b4d01254a8704e6d6ae17dc2ec28a7ad5a49
-
SHA256
5e2cd213ff47b7657abd9167c38ffd8b53c13261fe22adddea92b5a2d9e320ad
-
SHA512
90e6eedca424e2ee37c78e0c0380db490c049b0378541812734c134510c40c6e4c48c4e213f395339ed99ff337ef087b6056ac5aafb246c1789ca6082dcabd2e
-
SSDEEP
192:AOyUySl0UaDz2gWsIzlmj+BxZ3yqueWQx0lZicyC8Sh31xcjBzyxwn7AVhllz3:AVODaDSHMql3yqlxy5L1xcjwrlz3
Malware Config
Signatures
-
Executes dropped EXE 7 IoCs
pid Process 3732 MEMZ.exe 1084 MEMZ.exe 488 MEMZ.exe 2732 MEMZ.exe 3220 MEMZ.exe 2580 MEMZ.exe 5020 MEMZ.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 MEMZ.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\devmgmt.msc mmc.exe -
Drops file in Windows directory 59 IoCs
description ioc Process File created C:\Windows\INF\c_smrvolume.PNF mmc.exe File created C:\Windows\INF\c_volume.PNF mmc.exe File created C:\Windows\INF\c_cashdrawer.PNF mmc.exe File created C:\Windows\INF\c_netdriver.PNF mmc.exe File created C:\Windows\INF\digitalmediadevice.PNF mmc.exe File created C:\Windows\INF\c_scmdisk.PNF mmc.exe File created C:\Windows\INF\rdcameradriver.PNF mmc.exe File created C:\Windows\INF\wsdprint.PNF mmc.exe File created C:\Windows\INF\c_fsundelete.PNF mmc.exe File created C:\Windows\INF\c_sslaccel.PNF mmc.exe File created C:\Windows\INF\c_fsactivitymonitor.PNF mmc.exe File created C:\Windows\INF\c_display.PNF mmc.exe File created C:\Windows\INF\c_fsinfrastructure.PNF mmc.exe File created C:\Windows\INF\dc1-controller.PNF mmc.exe File created C:\Windows\INF\c_fscontentscreener.PNF mmc.exe File created C:\Windows\INF\c_fsantivirus.PNF mmc.exe File created C:\Windows\INF\c_camera.PNF mmc.exe File created C:\Windows\INF\c_holographic.PNF mmc.exe File created C:\Windows\INF\c_monitor.PNF mmc.exe File created C:\Windows\INF\c_smrdisk.PNF mmc.exe File created C:\Windows\INF\c_fscontinuousbackup.PNF mmc.exe File created C:\Windows\INF\c_computeaccelerator.PNF mmc.exe File created C:\Windows\INF\c_fsopenfilebackup.PNF mmc.exe File created C:\Windows\INF\c_fsphysicalquotamgmt.PNF mmc.exe File created C:\Windows\INF\ts_generic.PNF mmc.exe File created C:\Windows\INF\c_fssecurityenhancer.PNF mmc.exe File created C:\Windows\INF\xusb22.PNF mmc.exe File created C:\Windows\INF\c_firmware.PNF mmc.exe File created C:\Windows\INF\c_fssystem.PNF mmc.exe File created C:\Windows\INF\c_nvmedisk.PNF mmc.exe File created C:\Windows\INF\c_fsquotamgmt.PNF mmc.exe File created C:\Windows\INF\c_ucm.PNF mmc.exe File created C:\Windows\INF\c_fsreplication.PNF mmc.exe File created C:\Windows\INF\c_scmvolume.PNF mmc.exe File created C:\Windows\INF\c_proximity.PNF mmc.exe File created C:\Windows\INF\c_extension.PNF mmc.exe File created C:\Windows\INF\c_barcodescanner.PNF mmc.exe File created C:\Windows\INF\c_diskdrive.PNF mmc.exe File created C:\Windows\INF\c_linedisplay.PNF mmc.exe File created C:\Windows\INF\c_fshsm.PNF mmc.exe File created C:\Windows\INF\c_fscompression.PNF mmc.exe File created C:\Windows\INF\c_fsencryption.PNF mmc.exe File created C:\Windows\INF\c_fscfsmetadataserver.PNF mmc.exe File created C:\Windows\INF\remoteposdrv.PNF mmc.exe File created C:\Windows\INF\c_media.PNF mmc.exe File created C:\Windows\INF\c_processor.PNF mmc.exe File created C:\Windows\INF\c_fscopyprotection.PNF mmc.exe File created C:\Windows\INF\rawsilo.PNF mmc.exe File created C:\Windows\INF\miradisp.PNF mmc.exe File created C:\Windows\INF\c_fsvirtualization.PNF mmc.exe File created C:\Windows\INF\c_primitive.PNF mmc.exe File created C:\Windows\INF\c_magneticstripereader.PNF mmc.exe File created C:\Windows\INF\c_apo.PNF mmc.exe File created C:\Windows\INF\oposdrv.PNF mmc.exe File created C:\Windows\INF\c_fssystemrecovery.PNF mmc.exe File created C:\Windows\INF\c_mcx.PNF mmc.exe File created C:\Windows\INF\c_swcomponent.PNF mmc.exe File created C:\Windows\INF\PerceptionSimulationSixDof.PNF mmc.exe File created C:\Windows\INF\c_receiptprinter.PNF mmc.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 19 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MEMZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language calc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MEMZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mmc.exe -
Checks SCSI registry key(s) 3 TTPs 35 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0014 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005\ mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005\ mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0014 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0014 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005\ mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0014 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005\ mmc.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\sud.dll,-1#immutable1 = "Default Programs" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\appwiz.cpl,-160#immutable1 = "Uninstall or change programs on your computer." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\inetcpl.cpl,-4312#immutable1 = "Internet Options" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\systemcpl.dll,-2#immutable1 = "View information about your computer, and change settings for hardware, performance, and remote connections." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\accessibilitycpl.dll,-45#immutable1 = "Make your computer easier to use." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\telephon.cpl,-2#immutable1 = "Configure your telephone dialing rules and modem settings." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\usercpl.dll,-2#immutable1 = "Change user account settings and passwords for people who share this computer." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\netcenter.dll,-2#immutable1 = "Check network status, change network settings and set preferences for sharing files and printers." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\RADCUI.dll,-15300#immutable1 = "RemoteApp and Desktop Connections" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\DeviceCenter.dll,-1000#immutable1 = "Devices and Printers" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\fhcpl.dll,-52#immutable1 = "File History" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings calc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\SyncCenter.dll,-3001#immutable1 = "Sync files between your computer and network folders" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\colorcpl.exe,-6#immutable1 = "Color Management" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\DiagCpl.dll,-15#immutable1 = "Troubleshoot and fix common computer problems." explorer.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\intl.cpl,-3#immutable1 = "Region" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\devmgr.dll,-5#immutable1 = "View and update your device hardware settings and driver software." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\netcenter.dll,-1#immutable1 = "Network and Sharing Center" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\systemcpl.dll,-1#immutable1 = "System" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\fvecpl.dll,-2#immutable1 = "Protect your PC using BitLocker Drive Encryption." explorer.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\Vault.dll,-2#immutable1 = "Manage your Windows credentials." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\FirewallControlPanel.dll,-12123#immutable1 = "Set firewall security options to help protect your computer from hackers and malicious software." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\main.cpl,-100#immutable1 = "Mouse" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\devmgr.dll,-4#immutable1 = "Device Manager" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\appwiz.cpl,-159#immutable1 = "Programs and Features" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\srchadmin.dll,-602#immutable1 = "Change how Windows indexes to search faster" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\accessibilitycpl.dll,-10#immutable1 = "Ease of Access Center" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\timedate.cpl,-51#immutable1 = "Date and Time" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\mmsys.cpl,-300#immutable1 = "Sound" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\mmsys.cpl,-301#immutable1 = "Configure your audio devices or change the sound scheme for your computer." explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\usercpl.dll,-1#immutable1 = "User Accounts" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\Vault.dll,-1#immutable1 = "Credential Manager" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\intl.cpl,-2#immutable1 = "Customize settings for the display of languages, numbers, times, and dates." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\main.cpl,-102#immutable1 = "Keyboard" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\colorcpl.exe,-7#immutable1 = "Change advanced color management settings for displays, scanners, and printers." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\fvecpl.dll,-1#immutable1 = "BitLocker Drive Encryption" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\Speech\SpeechUX\speechuxcpl.dll,-1#immutable1 = "Speech Recognition" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\main.cpl,-101#immutable1 = "Customize your mouse settings, such as the button configuration, double-click speed, mouse pointers, and motion speed." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\srchadmin.dll,-601#immutable1 = "Indexing Options" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\SyncCenter.dll,-3000#immutable1 = "Sync Center" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\recovery.dll,-2#immutable1 = "Recovery" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\sdcpl.dll,-100#immutable1 = "Recover copies of your files backed up in Windows 7" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings control.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\powercpl.dll,-2#immutable1 = "Conserve energy or maximize performance by choosing how your computer manages power." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\sud.dll,-10#immutable1 = "Choose which programs you want Windows to use for activities like web browsing, editing photos, sending e-mail, and playing music." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\Speech\SpeechUX\speechuxcpl.dll,-2#immutable1 = "Configure how speech recognition works on your computer." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\inetcpl.cpl,-4313#immutable1 = "Configure your Internet display and connection settings." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\system32\DeviceCenter.dll,-2000#immutable1 = "View and manage devices, printers, and print jobs" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\fhcpl.dll,-2#immutable1 = "Keep a history of your files" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings calc.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\autoplay.dll,-2#immutable1 = "Change default settings for CDs, DVDs, and devices so that you can automatically play music, view pictures, install software, and play games." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\timedate.cpl,-52#immutable1 = "Set the date, time, and time zone for your computer." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\powercpl.dll,-1#immutable1 = "Power Options" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\main.cpl,-103#immutable1 = "Customize your keyboard settings, such as the cursor blink rate and the character repeat rate." explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\recovery.dll,-101#immutable1 = "Recovery" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings MEMZ.exe Key created \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings control.exe Set value (str) \REGISTRY\USER\S-1-5-21-2253712635-4068079004-3870069674-1000_Classes\Local Settings\ImmutableMuiCache\Strings\52C64B7E\@C:\Windows\System32\RADCUI.dll,-15301#immutable1 = "Manage your RemoteApp and Desktop Connections" explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2532 explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 488 MEMZ.exe 488 MEMZ.exe 1084 MEMZ.exe 1084 MEMZ.exe 3220 MEMZ.exe 3220 MEMZ.exe 1084 MEMZ.exe 1084 MEMZ.exe 488 MEMZ.exe 488 MEMZ.exe 2580 MEMZ.exe 2580 MEMZ.exe 2732 MEMZ.exe 2732 MEMZ.exe 2732 MEMZ.exe 2580 MEMZ.exe 2732 MEMZ.exe 2580 MEMZ.exe 488 MEMZ.exe 488 MEMZ.exe 1084 MEMZ.exe 1084 MEMZ.exe 3220 MEMZ.exe 3220 MEMZ.exe 3220 MEMZ.exe 3220 MEMZ.exe 1084 MEMZ.exe 1084 MEMZ.exe 488 MEMZ.exe 488 MEMZ.exe 2580 MEMZ.exe 2580 MEMZ.exe 2732 MEMZ.exe 2732 MEMZ.exe 2732 MEMZ.exe 2732 MEMZ.exe 2580 MEMZ.exe 2580 MEMZ.exe 488 MEMZ.exe 488 MEMZ.exe 1084 MEMZ.exe 1084 MEMZ.exe 3220 MEMZ.exe 3220 MEMZ.exe 3220 MEMZ.exe 3220 MEMZ.exe 1084 MEMZ.exe 1084 MEMZ.exe 488 MEMZ.exe 488 MEMZ.exe 2580 MEMZ.exe 2580 MEMZ.exe 2732 MEMZ.exe 2732 MEMZ.exe 2732 MEMZ.exe 2580 MEMZ.exe 2580 MEMZ.exe 2732 MEMZ.exe 488 MEMZ.exe 488 MEMZ.exe 1084 MEMZ.exe 1084 MEMZ.exe 3220 MEMZ.exe 3220 MEMZ.exe -
Suspicious behavior: GetForegroundWindowSpam 6 IoCs
pid Process 1136 mmc.exe 4172 mmc.exe 976 mmc.exe 5672 Taskmgr.exe 5020 MEMZ.exe 5060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 64 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious behavior: SetClipboardViewer 3 IoCs
pid Process 1136 mmc.exe 976 mmc.exe 9316 mmc.exe -
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: 33 4172 mmc.exe Token: SeIncBasePriorityPrivilege 4172 mmc.exe Token: 33 4172 mmc.exe Token: SeIncBasePriorityPrivilege 4172 mmc.exe Token: 33 1832 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1832 AUDIODG.EXE Token: 33 1136 mmc.exe Token: SeIncBasePriorityPrivilege 1136 mmc.exe Token: 33 1136 mmc.exe Token: SeIncBasePriorityPrivilege 1136 mmc.exe Token: 33 1136 mmc.exe Token: SeIncBasePriorityPrivilege 1136 mmc.exe Token: SeShutdownPrivilege 2532 explorer.exe Token: SeCreatePagefilePrivilege 2532 explorer.exe Token: SeDebugPrivilege 5672 Taskmgr.exe Token: SeSystemProfilePrivilege 5672 Taskmgr.exe Token: SeCreateGlobalPrivilege 5672 Taskmgr.exe Token: 33 976 mmc.exe Token: SeIncBasePriorityPrivilege 976 mmc.exe Token: 33 976 mmc.exe Token: SeIncBasePriorityPrivilege 976 mmc.exe Token: 33 976 mmc.exe Token: SeIncBasePriorityPrivilege 976 mmc.exe Token: 33 9316 mmc.exe Token: SeIncBasePriorityPrivilege 9316 mmc.exe Token: 33 9316 mmc.exe Token: SeIncBasePriorityPrivilege 9316 mmc.exe Token: 33 9316 mmc.exe Token: SeIncBasePriorityPrivilege 9316 mmc.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 2532 explorer.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe 5672 Taskmgr.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 5020 MEMZ.exe 2744 mmc.exe 4172 mmc.exe 4172 mmc.exe 3444 identity_helper.exe 1732 mmc.exe 1136 mmc.exe 1136 mmc.exe 5020 MEMZ.exe 5124 OpenWith.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 2988 mmc.exe 976 mmc.exe 976 mmc.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe 5020 MEMZ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3112 wrote to memory of 536 3112 cmd.exe 79 PID 3112 wrote to memory of 536 3112 cmd.exe 79 PID 3112 wrote to memory of 3732 3112 cmd.exe 80 PID 3112 wrote to memory of 3732 3112 cmd.exe 80 PID 3112 wrote to memory of 3732 3112 cmd.exe 80 PID 3732 wrote to memory of 1084 3732 MEMZ.exe 81 PID 3732 wrote to memory of 1084 3732 MEMZ.exe 81 PID 3732 wrote to memory of 1084 3732 MEMZ.exe 81 PID 3732 wrote to memory of 488 3732 MEMZ.exe 82 PID 3732 wrote to memory of 488 3732 MEMZ.exe 82 PID 3732 wrote to memory of 488 3732 MEMZ.exe 82 PID 3732 wrote to memory of 2732 3732 MEMZ.exe 83 PID 3732 wrote to memory of 2732 3732 MEMZ.exe 83 PID 3732 wrote to memory of 2732 3732 MEMZ.exe 83 PID 3732 wrote to memory of 3220 3732 MEMZ.exe 84 PID 3732 wrote to memory of 3220 3732 MEMZ.exe 84 PID 3732 wrote to memory of 3220 3732 MEMZ.exe 84 PID 3732 wrote to memory of 2580 3732 MEMZ.exe 85 PID 3732 wrote to memory of 2580 3732 MEMZ.exe 85 PID 3732 wrote to memory of 2580 3732 MEMZ.exe 85 PID 3732 wrote to memory of 5020 3732 MEMZ.exe 86 PID 3732 wrote to memory of 5020 3732 MEMZ.exe 86 PID 3732 wrote to memory of 5020 3732 MEMZ.exe 86 PID 5020 wrote to memory of 2172 5020 MEMZ.exe 89 PID 5020 wrote to memory of 2172 5020 MEMZ.exe 89 PID 5020 wrote to memory of 2172 5020 MEMZ.exe 89 PID 5020 wrote to memory of 2744 5020 MEMZ.exe 90 PID 5020 wrote to memory of 2744 5020 MEMZ.exe 90 PID 5020 wrote to memory of 2744 5020 MEMZ.exe 90 PID 2744 wrote to memory of 4172 2744 mmc.exe 91 PID 2744 wrote to memory of 4172 2744 mmc.exe 91 PID 5020 wrote to memory of 5060 5020 MEMZ.exe 92 PID 5020 wrote to memory of 5060 5020 MEMZ.exe 92 PID 5060 wrote to memory of 756 5060 msedge.exe 93 PID 5060 wrote to memory of 756 5060 msedge.exe 93 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94 PID 5060 wrote to memory of 3720 5060 msedge.exe 94
Processes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\Malware-1-master\getr3kt.bat"1⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\system32\cscript.execscript x.js2⤵PID:536
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1084
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:488
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3220
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
-
C:\Users\Admin\AppData\Roaming\MEMZ.exe"C:\Users\Admin\AppData\Roaming\MEMZ.exe" /main3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" \note.txt4⤵
- System Location Discovery: System Language Discovery
PID:2172
-
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\System32\devmgmt.msc"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\system32\mmc.exe"C:\Windows\System32\devmgmt.msc" "C:\Windows\System32\devmgmt.msc"5⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4172
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://motherboard.vice.com/read/watch-this-malware-turn-a-computer-into-a-digital-hellscape4⤵
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1848 /prefetch:25⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 /prefetch:35⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2572 /prefetch:85⤵PID:1112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:15⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:15⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:15⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:15⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:15⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5704 /prefetch:85⤵
- Suspicious use of SetWindowsHookEx
PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:15⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2400 /prefetch:15⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:15⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6212 /prefetch:15⤵PID:4180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:85⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1888 /prefetch:15⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:15⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:15⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3868 /prefetch:15⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6952 /prefetch:15⤵PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:15⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6444 /prefetch:15⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=5728 /prefetch:25⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5900 /prefetch:15⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7372 /prefetch:15⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7348 /prefetch:15⤵PID:5472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7264 /prefetch:15⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6676 /prefetch:15⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7772 /prefetch:15⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3676 /prefetch:15⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7736 /prefetch:15⤵PID:5816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7256 /prefetch:15⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8016 /prefetch:15⤵PID:5488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8108 /prefetch:15⤵PID:5576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7800 /prefetch:15⤵PID:6148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7036 /prefetch:15⤵PID:6296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7156 /prefetch:15⤵PID:6440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8112 /prefetch:15⤵PID:6732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8516 /prefetch:15⤵PID:6044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8436 /prefetch:15⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8740 /prefetch:15⤵PID:7140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8724 /prefetch:15⤵PID:6524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8656 /prefetch:15⤵PID:6740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7676 /prefetch:15⤵PID:6544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9012 /prefetch:15⤵PID:5636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8088 /prefetch:15⤵PID:6552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=47 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8668 /prefetch:15⤵PID:5160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8616 /prefetch:15⤵PID:6400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=49 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9124 /prefetch:15⤵PID:5740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9284 /prefetch:15⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=51 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9076 /prefetch:15⤵PID:5772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=52 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8024 /prefetch:15⤵PID:6632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8904 /prefetch:15⤵PID:6844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=54 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9644 /prefetch:15⤵PID:7104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=55 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7900 /prefetch:15⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=56 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8512 /prefetch:15⤵PID:6316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=57 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8456 /prefetch:15⤵PID:6900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=58 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8448 /prefetch:15⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=59 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9816 /prefetch:15⤵PID:6948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=60 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9132 /prefetch:15⤵PID:7284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=61 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8388 /prefetch:15⤵PID:7864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=62 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9564 /prefetch:15⤵PID:7988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=63 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10344 /prefetch:15⤵PID:7768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=64 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9360 /prefetch:15⤵PID:8036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=65 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9696 /prefetch:15⤵PID:8184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=66 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7728 /prefetch:15⤵PID:7516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=67 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9084 /prefetch:15⤵PID:8088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=68 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10896 /prefetch:15⤵PID:8076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=69 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10780 /prefetch:15⤵PID:7608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=70 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10548 /prefetch:15⤵PID:6400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=71 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8964 /prefetch:15⤵PID:7784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=72 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10044 /prefetch:15⤵PID:6928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=73 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11148 /prefetch:15⤵PID:7016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=74 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10088 /prefetch:15⤵PID:7656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=75 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11136 /prefetch:15⤵PID:7936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=76 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11312 /prefetch:15⤵PID:7380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=77 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11536 /prefetch:15⤵PID:6892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=78 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11600 /prefetch:15⤵PID:7656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=79 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11436 /prefetch:15⤵PID:8948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=80 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11620 /prefetch:15⤵PID:9080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=81 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11924 /prefetch:15⤵PID:8476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=82 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11168 /prefetch:15⤵PID:8348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=83 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=12132 /prefetch:15⤵PID:7668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=84 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10536 /prefetch:15⤵PID:8312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=85 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=12252 /prefetch:15⤵PID:7196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=86 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10944 /prefetch:15⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=87 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11076 /prefetch:15⤵PID:7476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=88 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11276 /prefetch:15⤵PID:8348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=89 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=12336 /prefetch:15⤵PID:8300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=90 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11744 /prefetch:15⤵PID:9128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=91 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11780 /prefetch:15⤵PID:6640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=92 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=12780 /prefetch:15⤵PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=93 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=12404 /prefetch:15⤵PID:2988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=94 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=12876 /prefetch:15⤵PID:7436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=95 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=12596 /prefetch:15⤵PID:8536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=96 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13236 /prefetch:15⤵PID:6532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=97 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11148 /prefetch:15⤵PID:6252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=98 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=12872 /prefetch:15⤵PID:7540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=99 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10796 /prefetch:15⤵PID:7256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=100 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=12868 /prefetch:15⤵PID:9240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=101 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13548 /prefetch:15⤵PID:9664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=102 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13584 /prefetch:15⤵PID:9752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=103 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13232 /prefetch:15⤵PID:9900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=104 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13452 /prefetch:15⤵PID:10008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=105 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13460 /prefetch:15⤵PID:9516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=106 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=12528 /prefetch:15⤵PID:9548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=107 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13820 /prefetch:15⤵PID:9768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=108 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13956 /prefetch:15⤵PID:10152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=109 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13520 /prefetch:15⤵PID:10076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=110 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13924 /prefetch:15⤵PID:9728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=111 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=12772 /prefetch:15⤵PID:8240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=112 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14216 /prefetch:15⤵PID:9312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=113 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=11828 /prefetch:15⤵PID:6028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=114 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13336 /prefetch:15⤵PID:9448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=115 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13620 /prefetch:15⤵PID:7292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=116 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=12820 /prefetch:15⤵PID:9368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=117 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13992 /prefetch:15⤵PID:7052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=118 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13992 /prefetch:15⤵PID:9416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=119 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14496 /prefetch:15⤵PID:9716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=120 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14712 /prefetch:15⤵PID:10540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=121 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14120 /prefetch:15⤵PID:10688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=122 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13976 /prefetch:15⤵PID:11120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=123 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1692 /prefetch:15⤵PID:4188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=124 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14144 /prefetch:15⤵PID:10956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=125 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14700 /prefetch:15⤵PID:11044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=126 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14560 /prefetch:15⤵PID:10116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=127 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14792 /prefetch:15⤵PID:10336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=128 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=14144 /prefetch:15⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1756,16273241628751617447,2199676813398057607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=129 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=13568 /prefetch:15⤵PID:5376
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵
- System Location Discovery: System Language Discovery
PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+2+buy+weed4⤵PID:4524
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:4672
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=my+computer+is+doing+weird+things+wtf+is+happenin+plz+halp4⤵PID:3064
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:2024
-
-
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\System32\mmc.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1732 -
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe"5⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1136
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=what+happens+if+you+delete+system324⤵PID:3864
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:4944
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=john+cena+midi+legit+not+converted4⤵PID:4168
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:4380
-
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\System32\calc.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+2+remove+a+virus4⤵PID:5360
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:1496
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+2+remove+a+virus4⤵PID:6120
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:6132
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=montage+parody+making+program+20164⤵PID:5800
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:5192
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=skrillex+scay+onster+an+nice+sprites+midi4⤵PID:4560
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:1256
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=montage+parody+making+program+20164⤵PID:5956
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:5064
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=my+computer+is+doing+weird+things+wtf+is+happenin+plz+halp4⤵PID:876
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:5248
-
-
-
C:\Windows\SysWOW64\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"4⤵
- System Location Discovery: System Language Discovery
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=batch+virus+download4⤵PID:6708
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:4588
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+code+a+virus+in+visual+basic4⤵PID:7068
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x12c,0x130,0x134,0x108,0x138,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:7064
-
-
-
C:\Windows\SysWOW64\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6360
-
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\System32\mmc.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2988 -
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe"5⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:976
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://answers.microsoft.com/en-us/protect/forum/protect_other-protect_scanning/memz-malwarevirus-trojan-completely-destroying/268bc1c2-39f4-42f8-90c2-597a673b6b454⤵PID:6880
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:6304
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=dank+memz4⤵PID:6004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:7060
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=g3t+r3kt4⤵PID:6672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:6584
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=the+memz+are+real4⤵PID:2728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:3884
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=bonzi+buddy+download+free4⤵PID:5436
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:6140
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://softonic.com/4⤵PID:3444
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:1704
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+download+memz4⤵PID:7800
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x12c,0x130,0x134,0x108,0x138,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:7812
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://motherboard.vice.com/read/watch-this-malware-turn-a-computer-into-a-digital-hellscape4⤵PID:7672
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:7632
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=is+illuminati+real4⤵PID:7464
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xa0,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:7248
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=stanky+danky+maymays4⤵PID:7732
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:7620
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=virus+builder+legit+free+download4⤵PID:6720
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:7512
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://answers.microsoft.com/en-us/protect/forum/protect_other-protect_scanning/memz-malwarevirus-trojan-completely-destroying/268bc1c2-39f4-42f8-90c2-597a673b6b454⤵PID:6692
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:7444
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+remove+memz+trojan+virus4⤵PID:8028
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:7392
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://motherboard.vice.com/read/watch-this-malware-turn-a-computer-into-a-digital-hellscape4⤵PID:8888
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:8900
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+code+a+virus+in+visual+basic4⤵PID:8384
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:8316
-
-
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe"4⤵
- System Location Discovery: System Language Discovery
PID:8372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=internet+explorer+is+the+best+browser4⤵PID:6848
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:7488
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+2+buy+weed4⤵PID:9200
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:9212
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+remove+memz+trojan+virus4⤵PID:8936
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:9196
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://pcoptimizerpro.com/4⤵PID:8532
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:8132
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=bonzi+buddy+download+free4⤵PID:8556
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:9076
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=is+illuminati+real4⤵PID:8004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:8548
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+get+money4⤵PID:6764
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x12c,0x130,0x134,0x108,0x138,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:6808
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=vinesauce+meme+collection4⤵PID:7548
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:6760
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3960
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵
- System Location Discovery: System Language Discovery
PID:7848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://answers.microsoft.com/en-us/protect/forum/protect_other-protect_scanning/memz-malwarevirus-trojan-completely-destroying/268bc1c2-39f4-42f8-90c2-597a673b6b454⤵PID:8892
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:2240
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://play.clubpenguin.com/4⤵PID:9460
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:9480
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=dank+memz4⤵PID:9540
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x128,0x12c,0x130,0x104,0x134,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:9628
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=skrillex+scay+onster+an+nice+sprites+midi4⤵PID:9692
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:9864
-
-
-
C:\Windows\SysWOW64\calc.exe"C:\Windows\System32\calc.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://pcoptimizerpro.com/4⤵PID:9336
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:7496
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=vinesauce+meme+collection4⤵PID:8332
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:9400
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=my+computer+is+doing+weird+things+wtf+is+happenin+plz+halp4⤵PID:9980
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:9584
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\System32\explorer.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:9096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+send+a+virus+to+my+friend4⤵PID:6340
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:104
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=vinesauce+meme+collection4⤵PID:3932
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:8272
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://pcoptimizerpro.com/4⤵PID:10700
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:10712
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+2+buy+weed4⤵PID:10488
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:10504
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=virus.exe4⤵PID:9472
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:9732
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://pcoptimizerpro.com/4⤵PID:10388
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:10324
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+2+remove+a+virus4⤵PID:5176
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:10708
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://pcoptimizerpro.com/4⤵PID:7252
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:9432
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=bonzi+buddy+download+free4⤵PID:10864
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:10920
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe"4⤵
- System Location Discovery: System Language Discovery
PID:9356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=g3t+r3kt4⤵PID:11080
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:11140
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=virus+builder+legit+free+download4⤵PID:10584
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x124,0x128,0x12c,0x100,0x130,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:8228
-
-
-
C:\Windows\SysWOW64\mmc.exe"C:\Windows\System32\mmc.exe"4⤵
- System Location Discovery: System Language Discovery
PID:11204 -
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe"5⤵
- Suspicious behavior: SetClipboardViewer
- Suspicious use of AdjustPrivilegeToken
PID:9316
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=is+illuminati+real4⤵PID:10836
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x12c,0x130,0x134,0x108,0x138,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:10652
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=how+to+remove+memz+trojan+virus4⤵PID:7144
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x124,0x128,0x12c,0xd8,0x130,0x7ffa630f3cb8,0x7ffa630f3cc8,0x7ffa630f3cd85⤵PID:10640
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1120
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D4 0x00000000000004B41⤵
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:5124
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2532
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵
- System Location Discovery: System Language Discovery
PID:4820
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:8184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:8484
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵PID:6364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59314124f4f0ad9f845a0d7906fd8dfd8
SHA10d4f67fb1a11453551514f230941bdd7ef95693c
SHA256cbd58fa358e4b1851c3da2d279023c29eba66fb4d438c6e87e7ce5169ffb910e
SHA51287b9060ca4942974bd8f95b8998df7b2702a3f4aba88c53b2e3423a532a75407070368f813a5bbc0251864b4eae47e015274a839999514386d23c8a526d05d85
-
Filesize
152B
MD5e1544690d41d950f9c1358068301cfb5
SHA1ae3ff81363fcbe33c419e49cabef61fb6837bffa
SHA25653d69c9cc3c8aaf2c8b58ea6a2aa47c49c9ec11167dd9414cd9f4192f9978724
SHA5121e4f1fe2877f4f947d33490e65898752488e48de34d61e197e4448127d6b1926888de80b62349d5a88b96140eed0a5b952ef4dd7ca318689f76e12630c9029da
-
Filesize
236KB
MD5c39d75bc50c34a50f076e6aa16d34e80
SHA1e772eed461b1e0c3d316e0bc880a50d60a909624
SHA2569bef68b93a772e98b2b99a1659fecc443e42fd772119ada486634cf6a9ff6aa6
SHA512ac06f88d2c5228e74ee639d116f9710f084ddc29b9e12640ea8fa143d722fb37b9786816642fb7d87fd10e4150af61fd67005b4a5f710ea72809d752037308b7
-
Filesize
19KB
MD54c61b65d01183d6f60bf80f29bd6f330
SHA16f94b52518582e8f519bce8c3f739d38cfb2436e
SHA256fc70e55ad50ce4e6fd5897d6f4903df528cbc881b31afec77b42bb06f799e150
SHA51224deea2490bd4ef1192a73c0c32fdc39713e3cc818b568e23e461f0baf7b40c9fa6d9a87437c25fdcc69cef8463deee40298437e4bb94cabd5b5f2bfeaaf7be6
-
Filesize
30KB
MD58f275f3c748cfe377684dd90ed2fd2d5
SHA165fa8030eff79a8e49ad47905b26629426c15032
SHA2562de7e29e82bd06fdc071f3a6f9af9d2d5b3b051dfeeb335be3b3677e24e66f94
SHA5121426d5ebf91a51a4e827c682f2349bf196a94edd510af6dfb1733eca19e4045ac37e8bf8197bbdd5852a9c5ce921c8ce4190a2cf7cb4feae21d55e072e018965
-
Filesize
45KB
MD584faa419d86403180ea636a6fbd34a29
SHA11e8455f4310f3b0a653cc0eb472fc7003c90ee0d
SHA256726f4e79e52a765cb444b96e1e41e31053a17daf41db81aa545b87fd73152bf5
SHA5122eed684235c73c296252b8a2fa06a428c4dcf1abf169b8e8aa51b5f0c621454c6a9b97e83e03e2f67e24c4a075f7c7bb29f9d5fff352ad30e5f94bbd3693ee70
-
Filesize
31KB
MD56ce4e6a94723410cea915401fb2405b9
SHA162b18c253f9a8bdb5107fdbc05e60e9ecae1662e
SHA256bf62913a7548899c0920a258904e5bfc50e0abb96af46f2be50e8a0e42cd9ca1
SHA5122fcade70ae872bab3b9be201e68eed917844052aee6d27899cffd435fcedb6750295c91cb53a8995c241eefa2d8b46649b260d47e14c5ee404f7bbd15b328b97
-
Filesize
31KB
MD549e4787d628bda07a6824bb05cc0d0bd
SHA14f27eccc6ced1c3a535ee1533876efc46d31aae1
SHA256191f4b66ee855c72250fe7f4f7c92ad3a184e0c5f3b4df45f91a7796c5e38fff
SHA512ab43ffd39189d0110644cb34196df0a336479f1e7081edcb9bd514fd82b67a0ef32a898ce2dd69cefc234522abd12e8cac905c87375a1c0406eac25c6e732bd8
-
Filesize
21KB
MD5344c09d87755a0715e3be7a6869e0ed7
SHA1254ae4accb099eec2e67b13017d9b3de6b6cf8ab
SHA2569df11d479cd044bb9f64134b7325946185e79ffe54b45024c5ea5c0a5d56f298
SHA5129ea2b692b550973c1057eedea6d649a4db3b934049714b2378eb385dfe021051c596a49272c6a29da5c93fcb7e30decb02dfc3a2bdf6116670a81bf5521ac0f0
-
Filesize
19KB
MD54fd9e1a4cc8135664d1df164277e29c0
SHA18c3637673fbad779dd9315b81ebdea58d28e9db8
SHA256e8ba6fd025b9e152b1d105db5c76df775ae9b657b227576f9a66229a95e0c4ab
SHA512ee5df56010dec023472b2b0fd53a17ae7cb26d4c7b0ea9a910500fac5553749624574f3a9ac77c3aa8e1b6baabeb1e3fbc5a4e5c4d95c020c9db1af88a5282c0
-
Filesize
136KB
MD5aba480be70e30abc103f261c18cc0f15
SHA1aab1fdfe6b0f06a9e959cfd266151ee082cdefa0
SHA2569fe478d06f06c550ae32e48d5121ba9eb03f3552535d7603192c8275b60f2cb6
SHA51241d2cd371de5bfa4c04ddd4f4ef59b476a84b8d0a688929cae643f9a1ddd1ed2134f9908c6a282f9e5da357c4907c087ba4fa8ccf099b6dedfd68c295fc0506f
-
Filesize
29KB
MD5071d0628cae2c51109a5b5f5aa5ef53a
SHA18a2223731b9befe68861f0ffbc383cee8c17cd0d
SHA256bb1d14cb6dbf3d24b28df7823ff19bce6c0e2e8c2d35fe4101e16876399bfec3
SHA512b31e83eca2e14e4ff600e3e852c9a34e7d218e723451a6a1ef6bf4a15996d502c602871cb92e4dc463572e9b7c1232f9cc70c07663f4a767cfc57168fdb4e88c
-
Filesize
43KB
MD5e9e2d197594b7331d92c27c33e16a38a
SHA14e534bf3ad1ae51e1ebca0a41d6666331da5047e
SHA2567f2f944c4a9fa58b14766623074bc10e82e843eed8a4bd334f0edebb79c482f0
SHA512ab994433b856247d3665dd5cee5bd6feba8ede2123aab69def2a7301676de4cd99fdd166812eebd4cc177a4ef2c2ce7bdb10f6eeea28a55d45b450a3a146806a
-
Filesize
37KB
MD522eba3eacf0b3b1b7bdcc8a587a75f42
SHA1f5f486f632703d5a38cac5a09b8452236eed3905
SHA256ad77da6eff8c1b6fe142f0ca82d20022ca9ac090fcd2c40188658aafdeba3235
SHA512108d336d199374dcbd546eb66d78e3a6bc297083236488fba2ec3cc8fe5af67cc53fc3bad5946ae3907fc0d174bc28c6764c4475daaadbe3afb16dd8ab648a78
-
Filesize
31KB
MD55f6fd03348fc1a22948ec13be81c8e17
SHA15af9ae409ffb1a567a177ebd469f6f5274e1b247
SHA256667ed19993b71a9f30de3e96602c64d00d9985c8f7d7fb8406b8e5b9df2c93e9
SHA51246afd1a1cae9f261c09b21f01643bb1eba87f42f1db1260329d2cf8c803f8eea71004d850acc5416334e30e9327089e7b7665542f35300ab260fd955a53e9160
-
Filesize
45KB
MD52fb4d0c41c094ec09125dd9d0df01ca0
SHA125d35a25a816f9e29372ab9bd0df84bd5481fcaf
SHA2563072b2d08bf1ad8854fe66877f605ce9a8f62b9a5d5ded682fab5e41522b9b37
SHA5127bf32d8d1e1c8c05cd91406f66d71f13d791dd41aeb1e5defe7438021f9f2fae9b304079f326495dcf46b7b950e195a18ec08ad86e058255d70e0324f6b0debc
-
Filesize
33KB
MD559a837920cca8e5bf845be9e20323634
SHA1b868114590bc93079d6d610253939279c728de08
SHA256626ca4e0eb258e5ea712950c3717707c2d633949f6d08fa7afdd2549b02f8c03
SHA512ef876008b0ecd265918a8fb0b3443c3d5bebd3861bfb1e28187a3448818a6c38712fda10df95dbe64b780048eb7c6bf8ed61d8acf890d984ec7c63a90c00c1fd
-
Filesize
28KB
MD51cb56eef859422178e829561a4474fa4
SHA1d5d79d13d52f84081c958d458c5003bb5f51887f
SHA256f26587750306a3b683873b469c9471d40a9942831d12fd694f8babc485246637
SHA512f2b67a40d1fd43e6d0caf6e66568eb6907d0ee83e2a9e939fb8ae2a3df26b0c455ee865df3a724f6aae9a02506b5b9ce5b7107fb60c09b83b05b1fb432e012c4
-
Filesize
60KB
MD5b145c1357eb028397bff7a38098b910a
SHA1ff905aa566aa5054c622d31c1beaf5234e7c2d62
SHA256682b3f37e4ca680de6afb7647c27793b4c5f16c4d73a816c1265518ead6525d1
SHA512d799b3be705984f4e725a364b47f1f133eceb0bf02dc1cc94d6652d409c6d11e94a4ecd6e0669c731bafd51e160ff922dab59e7ea408873b4108e0e8524070f3
-
Filesize
37KB
MD56ad721b415f4635a9b54a14b00e9bcb8
SHA1da13b8b3efa9fa51545f85ca9d0c9ef6406b81b9
SHA256857736720a419ba49f0c0b8f633448edf1ba55715e546b121351bd5a59911fb3
SHA512c0d30edb522a189517c79f74046e713b37bdfc714a43ddf83249d3b0930e3a4a268f2f07bfd3a455b1b6375505a48386d68c3e7ce215d4ce19aac79fad0ab401
-
Filesize
49KB
MD565da8d6932ad74d3b51694b5a28dd0bb
SHA1aa6e37cdacda153f499c299299a4dacf50c93765
SHA256309ec80a404d5ba8c9816e0932bff343c8e205fe36819908682289ed7c7ae482
SHA512bfce7ba0e18dde7d6f833709e565f704701d7a51b14d7c11b06cdce0b057290a334219c9aa4f7ea098c097eb779a2ceca397a9ad1ede0784348f78c81fd55015
-
Filesize
86KB
MD58055605e6a20a1b6312224c983d10609
SHA15ace6729565c5a048e18335339f3e7c3be47c318
SHA25679faa78e851a39c5d4546b8a72c27ba8c6f103760d488aa160fb1ffbc94e5916
SHA512c3477e6c5b8751be49dd24fb571a8caf5e78b8ea71bcb45741ef61703ff2fe463009ec59ea6b64d6ef700f1900e84d3af73a612430ea8f259c1db79005455acf
-
Filesize
75KB
MD5bbcf82e11fcad7def4f6bfaf7f08a77e
SHA1883551b16c15bbe6a9d505cbfdc9cf06929e54be
SHA2560647c1d9b00a0fc5928ea5f61bcb6c44b4e15c9a335d0c98cc4fcbaf734250f8
SHA512df4f66a6c77da5d2e909432e66690b0ba62d6b87be781ee6aae0e8a00fa8bcd8658f5ad07a1534b2c1c8585ffd290b57447adcae4b1f902da5e4fadab6253586
-
Filesize
108KB
MD5c2fd32708cdd9400691914a23610eb04
SHA1c16609615f8a352cbdb032fd9889b825b5a04f4a
SHA2567fdd933de190897886c271c2db8ebe729cd8bdc63b1712cc254cc5d889f0d579
SHA5124e39baa6b133de5c0fd763c6b91e3d2e29426022dc4a650b291d3749ee7e9b948f0f4a6a3c3736204b8636c91032a2d702dc3ef490c42122ae19d62dd6a6cddc
-
Filesize
155KB
MD5d49abb990421fc54f807d208636afa82
SHA1dd89dad898189bab3968d0aaab099d6be0690b88
SHA256ecf0873b4e5f03f88b4c5d8d71b06e7dcc581b60e63004178885ee1d3f6a5430
SHA512b13919e6d9983545449fb0ac6d99e98fa4b89c6f8969f9342438c366bd0a670eed4f89b7280c4f557c72329a3c49f662addb2a010df7cfd807c02b776d0b9a15
-
Filesize
69KB
MD559ba235c06fa4ff47e09cae48c47c4d5
SHA1f365127d5cf4a2eddada0013ca55bd4523e9d837
SHA256fc9d8e4b257d3221c48b83fc93807019efeeb0b121d5b371817fd273a21e98dc
SHA5128ba04b8de213e429f831e7152a579921d6a6277af6270394bdaebe34561852a326faf20abd06c6b06cbb0bae017a8ee13f6b81678fd8dd36e77d22bdfe9bd840
-
Filesize
34KB
MD5d74b9d94121977b55b511eb72f20b014
SHA1764c6faec43aa5abd0da58468bf14a22d44dba63
SHA256aa3247aed53ac3005eb62ea8e51ab5d0e4bba6fb14f0eaade2be834b46bc2677
SHA5121faf9e03370e7fa9787364f3fdef36a96222217a969ed815c9e37ac8d3f1d6cf7cd6816177ae3d8c9e380f99ff2b4256f43d5482860ae06bee17f21b8245d492
-
Filesize
42KB
MD50c74385e7737386aa46ae9cf3aa09966
SHA1a5703db8b6ad7256d932cd528a55e9c3d23cc85d
SHA2567dc1e70e67a65dc2032e0fdf7ef3edb35c5cb1efee4ef548501ea9fd953601c9
SHA5123f7f85d4b52a285b85928683e3c36ffcc75e6c0ee6d7801f7afb2069eae6ea555378fbfa43e09bb46a192ca6a8d40d06389a453e94de2da7a290885065182caf
-
Filesize
35KB
MD5d6d1fe34f4092c8ba306b3525301c81c
SHA1ac1c88a5925bc1a7650fc4328cad45ff8a106935
SHA256f8c39dbf87610443a29a100bef37296b484502eee032de63c03e76c9cc1f3926
SHA512a768cee0879a75f38fe2c111231e14eeee668fad88fa1ac6360ce9c27d1bcc0e40a9b17e0ca2ea158901604af0bd007eaa279bafeee2542d98e8a15642e7c980
-
Filesize
20KB
MD5e16d19bb6aeb47e8ef03488ce4b276a5
SHA1b493dfa53209a0279b53b6186fd1932593c35ac9
SHA25639d576fa539cda5bb8a5df714c5e061600f3248d5e61635431d434e85d96db5f
SHA5121f9f7958863791a968aabe185c7483d5f2db4b318c84f8038fcf547c0158b7d784f5562b223349222a9ebcb63d5807544d0edf3b346224a70abc3de8eefed4a7
-
Filesize
76KB
MD5992cf2d4e32562d36beabb60e389e02a
SHA1869a08eddc17c4d618cdff36991074555c47e9a9
SHA25618cb8ca0ca2343bab55af38ed59ee4192cc402b4912f31f733cc63ff33fdcd05
SHA5125e101999382e8e36504f9eebb768d2febfb00f645bd48abd0ae76b4abfed4c9be64ba13763344f1024d54ca508e369940e43885e3b7068343a050cc6a84204da
-
Filesize
32KB
MD58c94d6216b7cfbd0ba4fa4fddd6710e7
SHA1c03dac2fc172722ef34631c25b31171fc3284bc8
SHA256d7338011e86e8d26dd8f178fdfafc5d6d0f9a352c1a8c97a57833a75579db57e
SHA512d3bbea04e537a84fb9542a0948a293577bad6cc76281dfaf0286b8dc4c905f4852b013f0aa0a283d60f0d9a53e0ac63eaf6ccffb431c64c20214525641bdd548
-
Filesize
67KB
MD5ceccfd63cc0e640070c25a8ec4c4c8fd
SHA1b8787c340a3300072f04ff89b05558e1e5754c90
SHA256fb62be9fc4381bca0e194cac28ec4784cb5cf9f5d689105e88736c82b5f63aab
SHA51276c4c685592fe86bd0aba35fcc9d428366cc626f565123360f04f60dbba45daf257ad388c7c4885d1568046510a82133a64d46c27279ea636580b6109874cfe8
-
Filesize
215KB
MD5d474ec7f8d58a66420b6daa0893a4874
SHA14314642571493ba983748556d0e76ec6704da211
SHA256553a19b6f44f125d9594c02231e4217e9d74d92b7065dc996d92f1e53f6bcb69
SHA512344062d1be40db095abb7392b047b16f33ea3043158690cf66a2fa554aa2db79c4aa68de1308f1eddf6b9140b9ac5de70aad960b4e8e8b91f105213c4aace348
-
Filesize
22KB
MD52b41d3512250b9521aba871a5707cf23
SHA12bf8a039e31b6a549d10482f58d9ae7823ee012d
SHA256a450a6398f0a16e5ad065b2f3e4dee62db08ec1105cf8cd025561e78db2d3692
SHA5129c20fde1f3e0637a9ca38c72dd73f83fcb90ba54a8a4212e5654b3ccb85a2d23d0d2fafebaac871a3eb7c054ec186eaf7d46cd366fac192092276b901116704b
-
Filesize
57KB
MD5d7ef1882cce4c08a6b00a466ed9cb196
SHA16d2d8ca92916371d9317acc8bc0473b837c79eeb
SHA256a5428cb3f3c505c3883682d67d29e5995c8662da10390b9f7278d4977caff36d
SHA5121572f8f1aa42ed5ab5550548036ffe2c2b64716e353be8aeefc76f2ccf20f5e136da999657e6bfd8d61b14c18ec7bb927aef00d94bf078515fe6ae34de6e5890
-
Filesize
41KB
MD59d775bc13f54b749123a35261274964e
SHA1e07d2a8269cb847c9cb17fcd571d6e12bf51a0e6
SHA2565eaecdee0aee948d2b6bbccf828861a4e78daea5572202196e762562782f700c
SHA5123e5ad4bafbd8211c772df809f2260477eaf206eee9dc5cbc979414152d89535a0e24386d4ef9c8d0c073ff379d44c41750313a734bd40d7ca5214fa1c28aad6b
-
Filesize
35KB
MD5bcddce72e89d14010a2246ef1771fbaa
SHA17da33bcff5a929ed54a98c82a13aa6137e11124f
SHA2561dfe5319b74457c58fc84904e2b6b7feeb4cdac5c301218b78db6bd45f83581b
SHA5123c8b5d663c44ee042a21437714e12d352b827f2de319884aaf7156a68aa4378cca8d780214c28a76f0ce966d79a2b8ff03f37e0b0b9ebefb8d57bc9fe93e1fc5
-
Filesize
50KB
MD5b7b2bef45d2c61e30d85de49841bafd2
SHA175414e937b35fa629eee26b25a666c00de26592a
SHA25687b5161e1a7fcadb5c841a634f0040e9e50635fe159de9576d489953e360189b
SHA512294e8b51794e5addbd6fdb3f1e72cba6acfbaa71e93a33670806d39f8577c5445280681dd0e76edf82a302a5e926e951a34f5c60afdb96974d47f85e94517b4d
-
Filesize
102KB
MD55fb52a07b6a497a7cddd9aea15f3d4cd
SHA1dc43ea60d33694d89855c3f7b76845f0313c3267
SHA25633a64eeeb223ba0cd16bdebd9188d6a4a62a17a3cd40f54fa85d5f7c15c58fc7
SHA51251d283162b82f7186048b151c29233c9f8bafb2285234e462d5efc12b9d187c99c8b4cf956f042396bf736a1809bd1acd7e8baeee1e7bd5c1baaecc05d273ba1
-
Filesize
25KB
MD5d0263dc03be4c393a90bda733c57d6db
SHA18a032b6deab53a33234c735133b48518f8643b92
SHA25622b4df5c33045b645cafa45b04685f4752e471a2e933bff5bf14324d87deee12
SHA5129511bef269ae0797addf4cd6f2fec4ad0c4a4e06b3e5bf6138c7678a203022ac4818c7d446d154594504c947da3061030e82472d2708149c0709b1a070fdd0e3
-
Filesize
204KB
MD53f48bfb659787c6969b6ad5e3d228dac
SHA108343aba5b017127f9d0dfbc757cc31de942cd97
SHA256f64fb7add28f4b1b12bc446c955f94ed841e59f3dc82de31986ace2b38f069da
SHA512e5d4d5f6345deb2befcd789fa23948595604934bfe834c10c0bfff4ffe1591ed672f287d7edb846b5e3906bd23af6a98db1531cc1ff2312ec803df90a66eea2a
-
Filesize
70KB
MD525a5734df44285db3e981fd80b537c27
SHA120ffcfcac9a520a132eb339fe6ee98361704cc4d
SHA25637d0ac4a35ec149fe053fa505313fc69cecc3677aca15c6ad0f3ea878439f163
SHA51265237286316b798aead40f325e69dca47cbfde7989b5d1bcd7a0c8fef44f36c539a440a8de4f39d46677d96920cca84f13f05cd6a9834ca285d53c1ddf7cf77b
-
Filesize
223KB
MD5b0aaf57c2b8d877b21c43b8ed9d1a3d7
SHA1c289167054dc6e4590ef919671664ba9b9812a12
SHA256b1a51a10c96a25c26b6ca1a5871bc30094879015fe75f5842bfdb6bc322febbc
SHA51288aff7e775caeb9ad2ef0d9f98d78839f24bf43678b904f530a2b5bd9a1c2f5f56fbd16a42949e7758fbd8a21f9fbf16bc1876f7188a8156acfe0590818e12d2
-
Filesize
98KB
MD5c0fc67fbc5c5eceb437b516b4365aa86
SHA16b5a02dc604f8b87eb9d456969b12b45dda79baa
SHA2560b8baebdd76118229f6b486ab07c66d05b104fcc8a80df53261769f80ea093ea
SHA512e73b48bd36052a2f31aabf40b32ada01fb8c92345a20e22126bed271bcab08ba0a677fd9fd29cca23e98379b6c1e0601bdae9f90c38d9369ba32f292450886d5
-
Filesize
40KB
MD5b786554392ab690a37b2fc6c5af02b05
SHA1e7347fa27240868174f080d1c5ab177feca6bd84
SHA256ebe47cc89c62447316148809bda9095bd07bd5392a99ab4b8ac8b9f6764cda51
SHA512b71cdb76464a775fca909cabd0a7435c34de3ee4e19c40f5bebba6415295f0be2f82532a2ecda043c787ea4e8c23fd4e582a4d4322923fdf603a56e3fcb8b567
-
Filesize
181KB
MD55600049b0f0909a371eda70bcc2923d3
SHA1937588d6f2ad99e66b27d2fc2467b9197f260c99
SHA256581c531851d69d7fc6643e8adf32d2b92a6cd1ec3125c227d3d7bac955c6a0ed
SHA51205e019a2055693029c8b07e9eee89cec67aa729857da8d55ffc139b51d119fea99fafe15ff8bcde57d916a9471dd9fd838f6148c52b1c9d120c4976d97de5df6
-
Filesize
31KB
MD50c7dd36ad55fe6d0ef1971dec6a3fc93
SHA176a7e768908dc16009c58100150bdaa4c3c38f3c
SHA256528961b18c15d0350ad5635713e448c83f2faf991176211e5546d35d62cf5faf
SHA512dc267f7f3c389ac56229303847899606bab0e579f261522008f7ed7fdfc7c333241718a213fdab1ed00dde21a98ad2cc6f358518353bef8252f8429a672ff6fc
-
Filesize
410KB
MD5d50a990b2d071d694f2410f38e0617fe
SHA115d7ae91ad288a9bb902a078c754c59ccb672d7a
SHA256fee916d1271c44796d833de60d6e2f279d92cc4858f22a370074f8378ea186f3
SHA5120fd76ab2be091668fbd816038dd23ad58a8e4b38623e8fcb2c921bb1bf7cda958d519e69aa7629cf21b676cde329d21483c3812e4014fca2499555ed2695fd19
-
Filesize
51KB
MD5238d677a325e264bdaa631bb7687ee61
SHA175f19a5eececd9fcaa15487eb1e6395d121a7da6
SHA256eeac2189f5eaac434001c24cc412fb547f9173ed8be3e9fdf05f041615594672
SHA5122859088daa8140e14ed31c8f197ee50d6b415176e13aaaf7e2a309de52869c126c7f0607158d10a8c2f1a67a8e7091b746b7111c78d3294177f673e2bb400f0f
-
Filesize
21KB
MD5586fbd03a7f8e8efcfb44c02a0c721f3
SHA19be4c35c9e97db3dd6a6d16604ab58c170f70232
SHA256c676919c631bfdf174da2ac3dcb2e3102be25a93edb1ceda7187cf8165ccf3b5
SHA512d79b99b84daadd575e8979b5b076358cba724e522673f43962e65dc9b81da438bc688cbbea1d378a79c5674c58514048f622e8ccea0a41059f2abacc7afb7701
-
Filesize
58KB
MD546e427a29c3247944951780bb6ea8817
SHA199f2acae68a9a9191047c56d2e5e619c71abdb76
SHA2562f3f7b08c23c266af1670293ff537d6dbf6db94066f27357e72587bd2abebf7a
SHA51290c89e3f4c5930f488ea54c7a78e78f40483124d0945976c39282b8d33e081ed224c570ff3975ee321d89d3ebfdd6bbba8983de6b5abe24bd8a3fd15492e9411
-
Filesize
37KB
MD5ae2b5e6fd36c38beb90ca24ed95ddb5d
SHA1b447190bb67f2a881b718f6cc70a136d698fc5fd
SHA256cf22d1a1efc7c1aae3bc34d87149304a0198ddd635df1d73ba4c87dac536a136
SHA5125bc508d40dc2d9f2b81582ad828ed01e0895db01178a3189383e58723597651f314b80c6c1ad16300dd8f886cc64d3bb9131d58e0f71f46bc3cb92d15a096db8
-
Filesize
81KB
MD524cb30310433d948e57915634f748c77
SHA12fe0809905d39886c53948acddfbd2d2b5c6005d
SHA25654fc6b10156454d9cf64499d324d46605499abcef1f3487df300c4bffcccfef5
SHA512050a2bcc8d6c80f4707ecc3601c24da3e08ac90a39f2303349e37bd0f3c1fa7e692c66c8fe6782e442ec3216ca85ab0f311cb1ff877ab58a142830e285e02d72
-
Filesize
125KB
MD5df4544c7db408602d5b693bd6d757917
SHA18366c77c3a2ebcb60a11e44d84f969506e0ce9e1
SHA2561d3bcb9f804be967e3e158ea657160a3914fa29d5a73371549646a20030b75a8
SHA512018d882309578a7f8c3aeda79072983b0b6f561b9aea16db53acd90bdefdbafbf22eda94fc40fbec2e51837b7a415cf84d953d37a1fd886697a06a45bfe84469
-
Filesize
28KB
MD51752326ce45c039f4c5e81ea24c27c35
SHA14a22a9151c3c94d170cd3d23659e8e1a5a6f0070
SHA25613dac981c708b9d1c6d7be7666ab5ff34718fe7d1362428217e88c75530774ad
SHA5127ca5eb8b11184b97b7ecfed373420f7b9926839edcd36ea6bcc37a09190478175c49d7cfdb6dcbf1ecc8f2570feec9a0ac8aae08442fddef7986330043ff2d08
-
Filesize
20KB
MD587e8230a9ca3f0c5ccfa56f70276e2f2
SHA1eb116c8fd20cb2f85b7a942c7dae3b0ed6d27fe7
SHA256e18d7214e7d3d47d913c0436f5308b9296ca3c6cd34059bf9cbf03126bafafe9
SHA51237690a81a9e48b157298080746aa94289a4c721c762b826329e70b41ba475bb0261d048f9ab8e7301e43305c5ebf53246c20da8cd001130bf156e8b3bd38b9b8
-
Filesize
127KB
MD5a17f6c102e433af1556c3747c3579e66
SHA139ddb050a8fba4a5089dfdeaf31569ee71328da4
SHA2568f52855131f3f4547b7fc202909f9014b62e052ca48ce8eb168a11619d05a69e
SHA512588ba37d348caebc56030008d2a91bc9b6c36ef1127548990a8c2b999f3848243ba26788c27706341cdab1e15f009af42b9763de8632c985471ace82c91af71d
-
Filesize
55KB
MD568ecc58a934636e32b60461c4ee4f930
SHA18e8f1a3a09f4ea7aba307f4f23890eb0f867e4c6
SHA2568b61d8c123333fd1cbb0eb7aa361ef2220efa43dd08e13747b68d311de4810f1
SHA5127d4c8d057a8fae7168b6748a0179d46a0fac5c530b9747941aea29667d07b2a9d142e1171a63eb6bf9219906313ea3e283c3fc2803b534b7a782a7a284a8dfdd
-
Filesize
16KB
MD5afefcdc38dfbeb33c9fc73a22e49ef9a
SHA1f829d548dd4207c84c88c9cd068ca9f5c77baa5b
SHA256793918652981c533ca9141d5c6732138dd4f9f8af289b71511b884460f40c7cb
SHA51214071a36fa222190f39b64b1b005df4e7297db01889f5b0a9fb7fe542ab73889dc449c64ed12a9b05eaefd57e02229045ee774516d2662cbf64e4db6aa2bbe9e
-
Filesize
417KB
MD57abe00566dc57b4070f80e8016811fdf
SHA1cfde5239a158eae28e716d1c7951dc764af48a21
SHA256eedd04f61f79c6fbcfd91a7d09c4f6e96c9a3fd7ce0bb6befe8c392537971ef7
SHA5127bc3d331d00774a74f478a757594ed6fd1a3814b236fd4b4c99774c82b2de3d9bdbe26192408098a630cb4d3e752811da099277ce89971afb14657f66288fa6b
-
Filesize
19KB
MD51ab04b32960d5d8dd2a1739db591e8c2
SHA1f7ee9c498006eae03cfd0cb3c82df017e6ddd7fd
SHA2560dfb9ea3d3a975cd95e986a898c8320048e8987899444506056f93413dd4a5ca
SHA51214fa2abd5bc47aebf7f29c0da10b4e31da4bbac0bc6b8a8560f3681fd58cc50cd93e0761ff8ce172960a265fea86d7145910f0c286018cf5835957a310c49d1a
-
Filesize
288B
MD5bf38dd1e09d40bf7196d68fd8a502ba9
SHA1f92edcf0664d8af26b2ff02c394adcb916417b7a
SHA2562ca4f68b89aeded60283b5731ec1e514a33ec55df1d59fffdffc2399963b8a85
SHA51215daafa9eecbbf40e2db0664272e1924db3bf90828815636e8caab757495822907387b865866619c04b4ee1e05fd43d715ed1bc1e5b33d0233cfc7595ee140b3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5442b599f8651d82895b782add26ecb78
SHA12f46c0dda15212e8ad3f1b0944a66fac399d3441
SHA2563a3cd5a595b49391ba5f3fda9b697d4ee18520c336ae029598ba80782937e6bc
SHA5123defb5587da3a8577cac612d14682a6015ee2e97aa38c75278a04efada6db3ad98fbd50499097b5b8251eacb9dde77e3054b7265a09056de1fbe9cc8188d0473
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5111a275cdb92ecbeaee841b2dff1f6cf
SHA16298f2609bee45059c02dc8df641bcafd3fd28a6
SHA2567027b2484065f2fc0a65fd2d5be3ad5962f90a293d3713512f89d1ea92d6ee2e
SHA512f837b7cbef170f22616584219031c95816bff7da9434214d99b1c440603603fe075cca2fcb639ef444ac7163d561d9bc5ab1690b969c1a6dfcbe0ec18d3ee17c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5b3afc9249ed9291d27f19f1a1a47c521
SHA1226a8048b869e82f66f579e1b667c8135f662efc
SHA256011fa7031389bc23636d9caeb2ef50123694986bcf3ea87aa181efe1de65461c
SHA5120f5f15695b3bb4209d6184dfd25aaf827d69debf105a3742d5ac6100d3e13da47aef374daeea26ef083d3a002ebeaa7d578fafe5d16dfddf43411ca1ac77eeb0
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD527ab1c546fc3054566941a472bc00b18
SHA166a850f613a2823df0852a7f33b6913572fc8cdc
SHA256d5956d4c5475311e4eaa1641147643ccdd95abd9a479d380e60d5a0f8f5e0aa7
SHA5121831edbe55ada2027c8c14f5c4a9f61e59ecb61ecc9b5e5d1ab7c7ab2be93f672ce3df1d6f0674e0053e2d8c58f7b9e5fbcc69f0c8359b15c310afe9e99c58e9
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD554dae62757d06910972b334f3b5b46ce
SHA196fc4414e9bbf5d5ba21c115885db3437ca2c98f
SHA256e8dda979a858ec694d03ab365636173f0a8e0a90d136dc8ffd3ef06887e2bd92
SHA5125881a369ddcb9d2394e17894755bf48239c1bc0e08f8fc459d366e3edc7e723a9307ef31222dfc84922b252082c53c452278de3ba0a80e58f414140cb6c5d468
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD55cfc72a37b94c33c19270925fff97087
SHA13caa69f191821e4e6172eee4779dcefa712b05c6
SHA2568898e51b53be78f3c2ef261e36e05e4bc76962b5719e8f8c66c321b166982856
SHA512f04e3d32ff98697b67bd02a59c409436585416151d0835c4f23ecbd115f181e5b4c0487dd9269ca25ec1c68635ff07f1ebbf807900aeb4d803c32dee95d63f61
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5965e2d62f8c4a9bc6765afc953e8ad54
SHA1ddd877cc187d4889605ae03ffa625e7fa3e4cfc2
SHA25610e7e09db4ff57e99df079fef09c85ca8f6fd9c08db15c62765454b66fb1d3d5
SHA5126ac0c1748ddeaa4c9469267e14d5295ea6d35ebdd35c17ab46a5879dc1cb91aed9aa428650de691ffea63b930d1618ac4b761afb25d7d472cf3da652870076b1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize1KB
MD5cfbf76de39e64031f2b314b0e8616036
SHA13b8eb8264ae080c220f04b7cca7738322d58ef78
SHA2562787279dc5e7583b155b0b8761dc30e3b068f2f3ec0da91ddaa24b306817de7a
SHA512db5bf263ba313cc0d1f5589bfae4d9ea0f4a2c59d880d89b9c5ea516e6118a9cee9533dd4c54d8a5f93a5719b2b1d87e0d2dbc98152a484172f74a7cd3f07f3d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5b3e518840369c5f84c65a3b347553bf4
SHA1fcbbb503360766c0f253c1486dc0ce864b34c656
SHA25655f457b95cecda77c2e9724b63094c39bb5f5b10ddbb20477f3bb19e62319a20
SHA512e76a7814afdc4b0e2e85e6d9f5a17081289297ffb1e2d748f1cde998c9cdcca8ec7b25fefdf0e895be7d76472da3ba2f27998686fa67b2443778952154584e52
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5cd1c630d357c0c5d3af2a86cf9abbe39
SHA134629920f71e723d29bd189f148428d6bdf238bb
SHA256ad1f1137f120627be53fc6a20f40f78fbbe227ca93a1bd9a143225f70e096417
SHA512e68018c317fe0358403820b8f17a2346c4c376c9b9daba2af365b59b5d54a7e2dd92cf8c1ba99d7eab9d95f12a0de337c35a490f71dd3edbce1818299cea2647
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_www.youtube.com_0.indexeddb.leveldb\CURRENT
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
6KB
MD5365314bd20207b476bebabced0b69748
SHA1966e7a90bb64ccd87aa18c42a2d5f63754755088
SHA256a0243a3f804e4a370d2d2173683578248619cdff814df662a72e649992319a92
SHA5123aa49a8739e4f593367d232c71df1056a9db6708d945edc995f763178c46d97bdb5ea0582e1dcb2c49669a21898ea214c11ca0384239bc5b537469d30974d8c7
-
Filesize
9KB
MD52574bcbe85e533352bec372ba1d118d0
SHA17e9376caaad5dc3c604933282c72028065e56418
SHA2569bfe6c81a8843bbd4f785b20d668ab63a97c8d30593b6560dd69e3ec021760eb
SHA5127bd4b76dfc4d6e19aee12e6a20226a0eef1fbf3357851d0cd9f4fb5105d430482ad4d9724aceae77b57290777ebc72deb52959d7bdda0f85219efd40fae1192b
-
Filesize
9KB
MD5723de5663683ae6ab8ef5256b985760c
SHA18fc792a2cbfa06291272cc8191b40bf4b143d7ab
SHA256e7f5c3e8dc3b0e7ae7b2d460c39ee3081e3b93bd65d68dd913d9f59816164acf
SHA512e4e15a6030d1eb855aba400b50f924cdab484407a2c4d6da97526069596184324ae0d5f418b47be4ec8aaa9d15c450e25ef3fb815c05cb5dfdc2d5f5ab9b850e
-
Filesize
10KB
MD55bc2a15c6f62ad2b469686c6fa94af3f
SHA1f8f673f3cbd1c6e897555f06edc7323a610954a6
SHA2569c57c6b211a9c1402a09eacf6438d02136927eae864323a55474142f5f2867d3
SHA512198c47859976a0ee6828b974c55195ac6e07b15394d30a609da6d94ae3b3965a37a03915e4470807fff8f31cf3b75dd6ea00229efaa8e296225e14af3171bedb
-
Filesize
10KB
MD501cdee20b8403736b8913ab01adc8dfe
SHA10b6109c966eff5d2f9d7a42cffdd654213391176
SHA25628c70b14e3a74a6185594a5ca4f6a1594e1186908c39c94d3b9be69f6a6a1211
SHA51204b94fd85aea0d1ef35b0115813eb6d2dd67c038535179bb607ef3dffdba247aa6ec8c01f6d1228f55a8280fe3772b1b17c0b695c6b61281526a867cb76b4b02
-
Filesize
9KB
MD52582926aec0eb7d93d5eab9920c90923
SHA17f0d611fb62bce0a3aa56f847b5660a5778225ed
SHA25678f21af4a4f7e581c0501d0767a8de8c51cd04a8ee944dc0d7757cbdeafd7b83
SHA512eff4a0605694a8d9c3ea3d94fd5ffe611e87194415257f28ab8d512a128a693ad8b1a6bfcedd019bb699629770eeafe04d5dc3a6ba28b3d0a0c0ab346d97b2b2
-
Filesize
10KB
MD57b4762a07fde766d131f2dae1b746141
SHA1865a0b462de49c202f7dfa013a0d5d1b5ff00b46
SHA25651a280c20b5aee37ef245bcbaede7bca08ecbeba7345d7db1e75fdd8830663d7
SHA512d5c4aebc945a2165ead54e0dcc9bd6c76af6ad9223e21f7e92ecf8486bdb38af694d9fe93e8952272c6c6b4fc656e4be8474bac76d5c22acea58417568afce79
-
Filesize
10KB
MD57db27259d5ad93638192f5f8666c39ce
SHA1b7c853191f22b4c4ba2a1ceeb53d2b898f6dc382
SHA256de35c12fda32331e786a0af48ff56f497225eb67d41837a3d28e5921ddb2859e
SHA512c2a8ac76fb7e8cda08e278877e47065f58a69e592a34a923e308ea14068c1e69b7d1d4c9474b25a4d75a0928f7018ad72b36bd89d83b80853b2dbec85cd963cc
-
Filesize
9KB
MD52474343245aab1cc1ea6a564d6c7820e
SHA12fe52a994580f7fe7ec1ee2ea174ece0832316f1
SHA2566f13da1849b4c6d7f6cf06763f2abfdbb7d03de169f50696e122fcb56bcc36d8
SHA512a6c47071297462306c4900287ce2ddb30138dabb985f8964c27a547d536b25b748ce0d493e3cd941011cecbc053210bdb79f8790c329ac3ddbb1101fdb26e956
-
Filesize
9KB
MD58e46ac6f1923a640d40ff80983a6b98a
SHA151d07f628d05be424815cfe058657e24e5349614
SHA2564bda7017252533cb8db063d8cedc316ad13a420b98e66c7c9630f34a4da5aa00
SHA512b93a8b52566d3668491527b7f8ffed5342ef526f962f7ec4c821086f62ba10d084b4397c471cf0ac4314761fc8267ea9524414145232e76caec1c6243a4e31d0
-
Filesize
9KB
MD52a6ecebd1fef7a84ef0660e804d9147d
SHA1d14812db89135e929414f64e9119e6cc007d0aca
SHA256c30986a941ad3acdddc66d04624003410daaae2594cf845a4704966a87bc3656
SHA51214cfb490e2b8a73910c55775e14dd4ae48409e7e9babc99fdbec518fdbaa2aa792f34180fdadd786cf44ad6d8fbab335128db88e621438715bca679ca9590d94
-
Filesize
9KB
MD5bd0c6260dc3aa24efe725c47440920b5
SHA1f5fe374a4c5b408c51d2379581f87f4b27af0bdc
SHA2566ea55bf95058d244c8587741cf4dbb6f6b47e1ef9c2d898e857ccc969ebe13cb
SHA5129be40a64dc320f97cf9f858f3da18653f6b9e56d373e8f468817a4f135c72c619dc8b623f281367860fb37a2e3c90bf1662f9446faca9048b086dabfdad04bb7
-
Filesize
9KB
MD5b895d9a7ef4240fab1c954a28b242c89
SHA125afe43440876cabc66ff343fe45a310e096c32b
SHA256d0bc2f7b81088d9bc3cbcc3bc654418b30025ee1eed5de4fd6bb4f81eee721da
SHA512a46b5b3a20eacde5277a7e14bb98247bde99a539376c1a431aa99ffc3b650a6300c96912a44aa3882189d038cd87360eb699bb47f5f7fb876496fd490ab7ef28
-
Filesize
9KB
MD5bc830574aca773ea4b925ab1ba1d7ae1
SHA1c47cf657b722c0da92632799cd177f081fb9c254
SHA256e65156c44ad3179f24d5d94365b05eedd2c2337d2c0f49b4f8a0fa3cfa17d6a8
SHA5121222bd3429400b34c8066ab788e94eb06a4a83054a53fbe7468c725c4958e53b14a1c9e6e658cd600e00be108747ee766e923e9079787364dcce77d5d94b2e90
-
Filesize
10KB
MD50cf6a9d39b7fd38cdc85a479622d9374
SHA1bf02845f1e9829612636c21b2fc9782d4cbb5e49
SHA2563bb30d0226b42b0d423ba1b447e25366fa0371cf35998eef53226f32ab4edea4
SHA51292e881378ff398a169911af4ec6f11ab5d816e01f545c3f02642e8950c23020d020593773fdc4ef978c8ccbb20980ff7e560b5b6c240c71a844247afdff83a02
-
Filesize
10KB
MD562d0f9d7632fd8d147cadad785902103
SHA17bd1867a0bc78612c26e11cbfb8fe87b077bdee1
SHA256b4b31f12f33a4b1bbefa3074be970f7f3efb3439909a3603d33d8af8a90bccad
SHA512ed950d4fa2d7541ad771d382196cfbc0870bf2b98fd9b11f21159d4e8b0c3c2c02678434d6348c2d0764f76c7b20d9b0f56e0b61d360f9c665c7eb7d55a35538
-
Filesize
9KB
MD50062d665f452ada48d359d7d2d8a16b0
SHA154d5fca657682592b61363bf1eacd549b33b33db
SHA25697f2d45520a901eeaee962c003b73db1409e881d95cbbc8470905307b46c9376
SHA512d8edf72d198b4c5b0114bf0da44712f69929c7ee890dea689ad3f0d3f0ba4125fd51b88eb6bc3a55a4afb3687108c3ff2b3c6fe3885f813ba4ddeb7f9a3db6fc
-
Filesize
9KB
MD5c8dbc09152654f78d9336ea85340349c
SHA11491c1251fa1368b657faa05f0d564f3744c46a8
SHA256b0f6f19ed5e6eb8f1f0c0d1c40ea6b716e5c67deafe81e97567fca437c2f499f
SHA5129459c2f050de846889f6b4b696884344e27090c1ca287e38245ff2e26bfdb1a9b739e3ef4d0b2c9fbee8d85f413beb84bef5e75e9e56d9ee25b0f5d3739d2ad2
-
Filesize
9KB
MD595617a973196bdbee6b5de38c045adf1
SHA1014dd891145d6f60cc66f4fcc0709c9e647bd2e2
SHA2564b0614f32f6f87a49e101fc9b8f05b8984cebe22486b46c280b3fae96aca6f24
SHA512b91e0971db60093a829cf46aa7607d85ca6938dc1f8cddac2ccc28f8dcc81551854ce3e256e4ac7c73aaa361646826f45b01b6cf12ebea146e102084bbdedf81
-
Filesize
10KB
MD5dee14fbdaffefe4b8b16e80c344c2e67
SHA1af693a3cba990ebd3a49cb24fb5a944587721915
SHA2561c88876420e7391650178288c168b980c9c36b9aa152cc8bc39d3459d6750dfd
SHA512584eb7afe7042e3072e9b66d1906b0a08ea382828dfe968fe772813f7afc7b5afbc1aba7043d61e3e3346a6464b2243ce753dbf9dadaa35db2ba4b75983bc056
-
Filesize
9KB
MD5812fcd396f8f7ef3308ca550ce710c33
SHA17db1f895adbcd0e53de9ea53102969b66114fb68
SHA256ca4b95030434e645f7cb812fb0ed68f410edba878a3836f878cb699009fdc19b
SHA512d2f020191f87e250d4e36de72d9d6a8ba5380702a8acc7d9620e395e872637cb038bcf79d84ae8b901f17b9871d85c97b252a4e3b9907da49acd4d48178dba64
-
Filesize
10KB
MD5ddaf84c5517311ad43af7f0b22ff9b43
SHA17852b3cad7866293f79b01b538775397e774478e
SHA256a213ef06743cb9e2430cb38d40fe0f1f4aad1c3c75c0aa0dea35f4beff8a3fe4
SHA51290367ea8b04a0e21c9f21aab4d09ac24bed9642b1375ec98a2268c667820a5175d2f7432177c5f62b7421190deaed6788dd87ba71ab4c9d64ff2052f6cb74595
-
Filesize
10KB
MD58a8429b7648dfda55c086e58ed0918b6
SHA19e61d0b6cac2b49c1c992acc201b02d12afdcee2
SHA2569d7673ab346a63c91de147c3ec8763cf00f285ea6d9d7ff2483ee39a02519e58
SHA512286adb7f2c18962c01d985e911021198177822501d063f8425376ca074efb068a3c25e162d3f5cace7999db21b79e1f1edc4fe8e34009f3901bb3f5894825df5
-
Filesize
10KB
MD5347e620005162b8d6790c92d12ac4c92
SHA1eabdd0bed2f34f98eb2e67ea51dd8f6abf73b609
SHA2561ec704f3edded448134dc5fae7fadc32178d74099e8699f87fb83adb769c8bf1
SHA512c2e814604a3b468cbd3c0f3e080200e39520f0359eeb65270948d0e2a4c1ddca1cd1c23e7d9d327ec188ac1c1f5beb5d21566203878213a27f02170b798e7d9d
-
Filesize
10KB
MD53064516f96218cac42de444f1504180c
SHA1fae85dc8fda63c757a2d48de0939657ca6835daf
SHA256f41eaefe5d0a0eb59239685c627a4c70c3fda931c19a5abc2262cb02d0a84258
SHA5121a3caa332640001b53a1a2e2e750586adf10715a90bd1b33397688c68daf96830c23ff5c4f263eaa9075ca55e70428d070f46302388987e3aa92c7c342c1bbd2
-
Filesize
11KB
MD5cf12d2a631ead47a2ea14f3c610780c9
SHA12b39c63e996f8ce0b98ddf23b404f5953d601802
SHA256677b98920b904663d6bc669b066b35c00e4764d11d347a91d3dc8221bb4af7a1
SHA512acee1a30ba1855ee67e559b625adc47d6db8b330f12b4fe2312044c42f107540a1ec3729f372b3375985a513b58e877a0aeefaf16aa4669679b21cf3c85c0dcb
-
Filesize
11KB
MD5a0b0b098b494039423de6db45923607f
SHA14fc5446d76ef1ce41bc243903f7af7e39075435e
SHA2560f2786d9fe7c1995e2263a9ab52a8b06b052b902f91e6a4e5a7cf74def3d2270
SHA51288bb35463caa5eee43b7f947e4dc34b2973b9af5b872546d32c6d18230936c856d2a056297f54f482f6cabb16a906de8f0837939ce30a3d07e836f23b402be68
-
Filesize
11KB
MD5d82c34e3c9d8fb02ae8815dbc5b35afd
SHA19c1b030efcd46acbfa8c276434680b077127c81d
SHA25611adf9bdbe4b2b64fcf7ec865939f09ca0f0d522c45f734365692a01dfb24d96
SHA512b86ed6c350f0e82c08a1323e5e33db964901e14b8120930c9a2485a417b86e4c551ddf3485f34a4b0e730e9735f0ffa545abb28ed4b2bf2873b580bc1510e12a
-
Filesize
11KB
MD5806c6eb9492bc8be2a7e0767794830a3
SHA1853433b9f21f88fc7c8ae3c5c30c89188783e32b
SHA25621bdabd6e6e3bd587ad0b31bcdeb6c73a1d87f156321f12e7ca71661217b3513
SHA5127b7b0274657a30115607f87c1a0f1fc5779aa7cd1bbd221175afc1c1ce96bd9bb2df24fcc90e5a44703be122d41555f4bb01b4202dfe5e4fd2801520027d888a
-
Filesize
11KB
MD5e9dfd7703356ea3fcbd86ae5eae21237
SHA1568a0117d5f50d31a9949248c407390b3a79dd57
SHA256c2a41d80819f9ee0a2717bdaf894850d332aaeb6a6665e3f646ea45a098db6fa
SHA5122ff37beda93cdc88aaed87ce71322845af5ed1b89b3c4cded47e17aaf81ac0f26db4646189d07a51dd7f1c1d1da6439430deae3734456745d66d688834f8b901
-
Filesize
11KB
MD5069e771fecb155e247fcc3e825ace928
SHA11f533653e96dc9fe4001a6128c9607b8dd60ec78
SHA256fda2d498dc5e25aaae1314677457c0451d91aa5563bb2a6d2dcc363d9e92278a
SHA51263a1b85614e915e6c35aa8c09782f9655fd2e39e3ca5b8770f7d9a080e3a30fdb933f95f7637e2c3e25b68932215d76e06e940cae83c6643d6a6eadb5097d2a0
-
Filesize
9KB
MD52c61509ad3f677a581eabee4605623c1
SHA153b1c0cefe57b9c574591ea66e5ddc6e6c377801
SHA25630cce4f23e7ed0a9df5ed55f3551be805de4ddff04fe541161150d15d543f090
SHA512154703c60f2ec4fa119d2bc6a55cedb84f4be5385c213533b070d1113d4ab6b94de43636d7e18db9e3acb3bb723572d53cf438288825936f7ae3c2de30a502ff
-
Filesize
9KB
MD58255513007bcc22140f6b2810e0b41fb
SHA13793e3d4ec98c309f48bd0db6cb6ae5ae0040e8c
SHA256c0c28174253d63e99294186b92f5f6c54304e5abde2fad23e2b2730e8a59773e
SHA512d4be7d85f22c3579e210af4138f87f3de0b10f22f2759a75281ec23c2f983f9eabbb7fb53e835bc11044d77953380f7a05060421c0da257b303f074f2b645014
-
Filesize
10KB
MD5ffdad95979c88412d95418eb078e4809
SHA1c56aef134b6a204a781e17539ed96df7cb9f10c5
SHA256ef743ff8b7d1645b29133ea686af2fa397de1d619087744bcd8b6cb092f4d595
SHA512950139fff4b9bc39ac1378f8ecedab31eb2e067d950eb3677def4ef9f9db29c55883c03b41b925896522f8078d34475734328b8cacd6ee36e379b7841ecf6464
-
Filesize
10KB
MD58927c19011cb12a872fa7d546531a486
SHA1ff84c8389fa280858c7b09e75071be695282c15b
SHA2560543e092dd9425321955fc336bb65eacabf411c80e9a27f4dbcc474e31af331d
SHA512bb207b9f66e6b85fedd848cf6d633e22b73cbfe08e78177bf015cf115a1ca5f3d653b03c802d0ce8e15345cf451581ebf954bd5c995e14523e10b57ca8a3a252
-
Filesize
10KB
MD5ebf5ebc0693440df6a4142dd7c5adeaf
SHA1e101bd680490ac7528268cbc24ef5af7dcb408ba
SHA25676792a32ceef255ead6b18cb4cabf4d12ce9ad84ce299996cd97e3e29214ad7a
SHA5120f1ca2c0c252cb85e06dd90d36ad756aa52128b07c2dacff543a8de931f85d464729695a4cb93773d1e83d32d9fc2898bedba17cbdab38d33555afc0b14b1837
-
Filesize
10KB
MD510aaca89982ec77c9991689230209920
SHA15c9469582b1109ad7528f56504b077d761df0633
SHA256db9d941e6fd347ac9050c13fe1ce9de8e34a3f97185bfba683112ec6ac0be485
SHA512c2478fe123427a8e047dbea8ffc3ca656b65714abc48213a3f26980f4a283789aae824361599ab0cd2d38c9056b325872b26cc22a71f80319824f3878349ac07
-
Filesize
10KB
MD5864f86e81b68f54f012d21738c66e9c7
SHA11ca5a699103f9976c2adf4d9bad7b1e832d8a198
SHA256ceb3f04f0db1cf7efbed94440a257b16f8ed5d05562a94f3b2e950bcb793e436
SHA51266bc5f9c595c3b895d0781e2b2ac8c656c5f948603afc21b6c51683161cb2676724d5348ba700a6e2f18ec610392f78cf539aa41f029fe02ae9a83d2c0082ec7
-
Filesize
10KB
MD542ae2fd4b0a22ccbcf46a63d7ec4e356
SHA1af037e54027987c0dfa4f291d8fd3ab40a020aa3
SHA256e925a453c57b3fee1c1a002c8c405483e02fb28de8fb9eecf0b8ddcc613734fa
SHA512bbc844eba7a5079edeae2556cc799e90e90b00c9d863bad93a5992ec6adad543247e4af11955b8328a6b5aec292d9c37400e9a243d7f0b9243e18bb11d1d8323
-
Filesize
11KB
MD5362cee408a511800d3c44988be77049d
SHA101396295983972309a95f0fbdcb8168786bd3afe
SHA256c4521ded5d30cba83b5c49cb28e6b30b3318095f510263cf316100763d21ff4c
SHA5125ae8558d8d70cca90fb02f1fbdf9c3c8d1bf59ff82752effe4d82cf0bc6e4bc5bf8f45ed3e956f7238f8e66c73c7080195615671355020a85cb251e4cefe1990
-
Filesize
11KB
MD59297eb27bf099b0b4211e4ced5614ae2
SHA1b9e2bbb663541363146fcd490929849a3d57a497
SHA256b2c877c1486cdbfee62c1748678129ae9c9de826d6392f62ed9852ca0f864c73
SHA51273854d4d5db392e6f29139a91d2ed4d5debeb9f9c3867245b88fee892abfbce09b4e0fd43dc6be6c0567f6b1a32a2621465d1b69a6ef86440a4e3a5391a61e66
-
Filesize
11KB
MD5b5de7e72aa63c2feb58cf379cb2e9b25
SHA143406ed26e7615645460a0b1f3c7320b4ea571ca
SHA256a805a5a7f78f94b749fbeaf685234a2d474cdb6362e72382fec867421fcf8b21
SHA51288dc416dba3b15028f9beb7be99f1b199240ec65f0296035120959fa9a11ecf4507085ce95ea716a28133ecf9df08caa34db54c2e37e977eafb3c697abbcef6c
-
Filesize
11KB
MD55a78901d1cd7d095aac67958049e7214
SHA1a2043fd46b2828396f767bd5c7aa6813f40c9b00
SHA25601ef0bf56a131ac92dc4668bd59510ffdea1bcbc30514aac4440b58d1b07d261
SHA51251f39b5ee22a9d08936041da65442f669901d3dbdc742a1dc9da67d44ee73e7eaa877c0fed9de1cac971af74c4614ea4d8c4a864cbf01fdb6a9851ffb80ee93f
-
Filesize
11KB
MD5e7885064affcbcdf8868bc22a2544673
SHA18b12b2d599395603717e20aa98890a8ca0438730
SHA256226933185cc6490c1b6e412dc40ac54a4a512027d870bf3a8b4aaf8f74c7c9cd
SHA512802b72ab0e11d72294247356555d53c1a3bcbff562a31b1d9d01d03016574e2b901e663036d3d17f521d4119d71729a30772d67fcc9c73788348198840b06987
-
Filesize
11KB
MD56472565b4c6bd96bafc94229c464f9f1
SHA167d1ec549b4784d1f8927a8e7c736a60cb3a7ab0
SHA2569b2ed405587f8b57053e3309de0603dcfe36668188aec39c415bbfcad5678112
SHA51211390fbc459e5ee51c96c617c098ee4808140aaa5f88dd44a1b2e4cbd326567d85c51d4990b3d9b0831842436751516b76a6172c0d5d6afe6d5bf3309316a4d6
-
Filesize
11KB
MD5312bc1e0bd0a93f13bca8c2d10aac077
SHA113f93aa05e8ca6f3d34bbcdd57a39efeb3743e7e
SHA256701fa94a2a1237ba32f12af5e5a3d12698d1241cd936b54d9b5f696d62ea9bac
SHA51201adb9fe79c567887e0688399c4ba1105c553b483ebdab42a7418ff991661800de16219e80b8601f41c8c3bef62573e264fe2ef710fb7acaac2c825a1d138bab
-
Filesize
5KB
MD56f692758631b46ed20d29d29c7fbcad3
SHA190fde3ad1f73bbf4f931661476ad5fa37392f0fc
SHA256fe1b5d7a257edb36c86898300e195685c9eae199e8b529317a768329cb8205af
SHA51245d3e52b36e412683d0874a7ed41dde53f2877fffcd3849ceb4930ca2e2dc118d2d19d097232f909855e7663ed9be8261daa816d95221382dc5f2e3bc1f9058f
-
Filesize
10KB
MD53102b4b5acc487498742ad82e5cf9720
SHA16b9325542f48ca10773b70bba08c9de103af77b7
SHA256c6ee953f5c73c13037a458ee11a14395a813a7f00b73b47fcb166eefa95f7bd8
SHA512169d3d58d82d70bd9298fe3c205d9f296f6c3865754331f4cbb1a099b30d9aa5dc1f391895af245fe3388e69960dd332e5987abc8f74917ab214359833fe5452
-
Filesize
11KB
MD5546b0f33dacb056b8a0e83bb3a119d72
SHA1315f6c5ee829b9fa17ce55da8eb26a399d48c75e
SHA256fadb360f06712b95ec29da40cf7a7cf5cfe8ce38c68596dac8929715dd514f32
SHA5127562afc3463c627c86db9d51c4b7383375f1705e2dca62c26f864628a79a6b69ccf2bfa1447508185887e45cbd0e0b00c4df5877155489b9587465c138bb3bae
-
Filesize
11KB
MD56ea58b6d542763ed27d3a7c9f8314c03
SHA10adf6d91d34481beb29cdb41b3e783fd2c8c4fab
SHA256605350fadc24a7527581b01c216a8b825ef63f6c9c6f2d93bad0ba9416dc4f25
SHA5126814b183c67e5fd6019be2a977dc27beb378ae31db0640534545a89eb28f1b34ac27463867a174ee3d2a1ecf75527a1a26d809170b697b920ddfbe9b3412652e
-
Filesize
11KB
MD59e1282341bd44f08d28ec2c4f39d9011
SHA14d8d535fed0e5f34cd0cab47bd1c00ca4715d635
SHA25654f708c7c4186ed19024693fbcd47dec6cd0f1acaf4945026244f60e134c501b
SHA51227d4d74709fdc4704ad8373349330a685de04ecaf614a0ba5b27c3364aab8e14cad4cc680359a34b3611b3e88989bcdaec1fb33d1c5527a52553c1ddc8ed4a00
-
Filesize
11KB
MD590b2fe2d35cbf3ad777151689d7c8651
SHA1643e3f457508d141cac9d802ce7fac14d4c1eac3
SHA2565c996129e92a161a6911f42e867086f21476eccb1aa0a68a8fc1a6772e66095c
SHA51223651b2b1be1752c0618f12480ffc3204db65bd34b6adbeeab51b31b961a517f490b7297bd578f271c3a1edddf83045ea23159eb2d25052cf595de655724d816
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize26B
MD52892eee3e20e19a9ba77be6913508a54
SHA17c4ef82faa28393c739c517d706ac6919a8ffc49
SHA2564f110831bb434c728a6895190323d159df6d531be8c4bb7109864eeb7c989ff2
SHA512b13a336db33299ab3405e13811e3ed9e5a18542e5d835f2b7130a6ff4c22f74272002fc43e7d9f94ac3aa6a4d53518f87f25d90c29e0d286b6470667ea9336ae
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt
Filesize90B
MD5ddeff62f62f0738843adf9cfbb83b8bd
SHA16f502da589ed56414bc5d128ab270b684db50c51
SHA256be586bcbb46e7a8d7010e41809663239a2148164c82434f5444d22a938583318
SHA512886b4c5a808bc4daea7d14f8b32a4b137c541feb983a8d1ebc9646ca80dab03340467bea876d47e71d0e782400a9cbb60be0eca575e793d6335c065e7814a05b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\CacheStorage\379f1cbab5b08b6fc9e08681e42d8be311441c88\index.txt~RFe5f865f.TMP
Filesize90B
MD52c10b3fad1b989dec7a21556375018d1
SHA1c0fb389261b847c20f9cbc95145fc3b6a646784c
SHA2567983a631f4a2f5e40ea0b1cecb57cf0f52c8488a7da5c206896e09f17f7b2329
SHA5127f8cc9e3f07f5fa9c62d737ee9784344f519a16034dcf8c8863b9f16257c7aa94201028c3b06bc79c7e2e44b43cc0f831fe3b0152772a633014ad9c8264db11e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
Filesize72B
MD553bf3e491efa769cde151fdbb3ea87a8
SHA1a35ee15179bc30004417409f1033eaec460db6a3
SHA2562340ed352cb43111f2d516a4ba1449cf6c3eb58097054ae36039809c6f3b9b9d
SHA5129371d6978358d64789564ac2bd09dc4d00d01b93aa3b8a83f63713806db0a49b27ae3f481efd6bf2458a09a0c3309243963b3dd0ee5c0c7315f1cbd9e729589a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe5f80d1.TMP
Filesize48B
MD5bbe2375f730a097a3ea904f4af05f03d
SHA10b86b64fcb68a64af63ff5a2cdfcf908a82b635b
SHA2568a70dc34f4db640515c769a07e14c61f5e17c8dfef6730dcd30425f2b1d7c623
SHA512d6c41b94ae9a7112e1bb50b84db7c0b1b0452454ff8450e2b695082ee0d9772f1fe6844fb93faebd8125a12dcc18383fc58fb2a6f8fc6a2cc6bd7a7825b6196e
-
Filesize
2KB
MD5a4d76511225fcde9740add20b0545ba8
SHA1beaeaef4bb29cd60009647947873622322cab112
SHA256f27ff6e4caea4f91a001e81edb7fdf7fa0ac858aedbb2444a274d1dfa4ed9795
SHA512c18340d489edbe38d6a6394adbb2b8da515e2438e869e0991099a291369b2f4f8a0a16e016da1a455621d320963edb04c4fc3827dd8228f313ce2ad9800f8a2e
-
Filesize
2KB
MD5f21672de4febd7b1637da4c9f2c31050
SHA144c093870904c4e347da95f853962ac509aac216
SHA25615dd655bd9c94328beedb90a9388f0ce9c2cd7dcc58fe0b9a4ad639d854cf922
SHA512792796c84166425db10262a8981254c24238946ba98c7237ff6edd1be215535077d54759d6b3accc4136f45e23faa91365d09802ed42ce8990ab8ec071487cac
-
Filesize
2KB
MD577b8933bdee18e9cb25d16fb41e9b12c
SHA1b7dff99a3a2038637896337c2f41aecc7bfec049
SHA2564e1b52ffc8f11c6dcd506e6cd3e1f10e285c1e366c4c1bfb67ad62abd458f5bb
SHA5122bddeb6517e1049aa563f0ff111293f77ced705efd5430048c95cf8cc75512806c45d82609f8b1faf5179afa87b62bdc6fdba4e6c7f54a0901d812cf00721ff5
-
Filesize
3KB
MD5524c41f137282c4b6f07438a30872581
SHA1e46854c42ee2437c2158147bb044cee4ca6370e0
SHA25624c5619d10c5c0e38df7f2d0a4f130632720fd6eb2772747bed555f9d609f0df
SHA5129da6b5aa68a69635fe7fb657d04c0c8dd9995994ffb6a872b41ffc555ce6038cb2b24e3239b308ff025dcceab1fb2134ad481648f5b3aed5a88c02cab4322ca2
-
Filesize
3KB
MD5bcf23efeb0d61e08d8fb027074a23165
SHA189beec62a11ec8813d00576a0055568cf7350940
SHA25689c6d273699a17706af0f704fdef289135418aab51fd3f79a5345a000cd5b1ef
SHA5126a39b0f2fe19cbc09df9b22ded39176664fe856fcbefa7178550f3940fa667690956752834b4920fda689f96467af0dac71e4f4315b1ef6e19bd3169d8b00496
-
Filesize
4KB
MD59f9a2e2443f865e7d556e535407a59b3
SHA16c0e3659cf7eec4cc705046964a7b17a563aba4f
SHA25670bd2580c874cadb8e26488c87f3a29560d853f12d1280c8389edb715a0e66ac
SHA5121674b38ccf3e0bff1abb734eb91621cfa84ffecfdf76717c8df389ff43aca36e54170b041d25e743bad8c4e3f096fa21f609bf7712d105f9fbc58b750e9a6edf
-
Filesize
3KB
MD56caec5199f3ac5a834924155912e1244
SHA162ca75e91f153eaad975179d956f54f0a856d30a
SHA256d4853cbff4aa544d8693707fe49bc4a95ef67ca7cb6923a8f1b6f971dd20771b
SHA512794565d9b53e74cde6366a5ae1330d32a515a2ffc1af4fc435b836c17788d0a90584f151eaa9590237d49ffa65de05a1ac850d20fb3000555aef6f09c6c2e338
-
Filesize
3KB
MD5cb9ab7733cf33fce904f4cae4b37b9cb
SHA1d2ecbdd6977dadd20c370489421e56e8a084f121
SHA25638c8c90b821d919f4005c23679abff38fa106d6b1b8e6cdfa730687bbff65304
SHA5125cd830f7666015c57d63ab568f2268ee49c0958922be5e22a186bcb7f86f946c2c4b6e8dff8a832e7ee141390b9dc3d25811b9d60c2bf96c53ab228c3e63287e
-
Filesize
4KB
MD5604d20e433b0edb8d0c8657b30b397ca
SHA1d0bc507c0172de3a98170269430a176993ec2660
SHA25609385f5c86ecd7bd5decf8f451f66f86f366f39eeedda6ddedd7a591ebf123cb
SHA5124648db55916bd8f71207462df5142e69bc9c9903e984908d50ce16bb5aa35835c896876ce943aa5adc9417e92bf778649caa2ea4cb56a104d7049440901f6cf6
-
Filesize
3KB
MD5dd1340450232eecefc2aafdb92031af6
SHA191dc26be2dd08011c2747b0bbcbb48aeda5abe62
SHA2566a69f092e224f67af505574c112dc9649bed70d5281670c234e5328cb23c95e4
SHA51286da57d7cf803e62fd87f3e69c2b0eff0af6bfe3cc636b55654cc0d163d8a98389245e94cdc1cbb8ce2c158b339020ec430bbe4076422510e360dadfbdcba8f3
-
Filesize
4KB
MD581e23a5279ec64321abb2ed25fbb1226
SHA130a3e681bb7bc1f96abbcbd03c42817a0f71e542
SHA256c6adfdd1acd3ce46b5c49ec9a71359efa27851fba061e47dd2a786a6e010cee3
SHA51275f82edd38d517b3653540719e8548d19d0106f27ea5612f38964bc2f6b36f7ef6c38db2fb7fa3d7b285a7bf1328a42cb4325113ae9f6031a05a91614ede5d31
-
Filesize
4KB
MD5737faaebd57d07b9145b34f2bcb479ef
SHA1e09edcd565dd4f7336e172796effcb6956328b40
SHA256d0197b25c1472229f7e113e1517c048cfa78db5adace9037753b88aa282fce02
SHA5124d4adebc593cede4f0df0e77ea0c2ae4423202eca2dfe61b8241ce9af7ea7fcdd14e2056a05e43a886297b14049c4613c0e084ae8fd511b83d83e8953b4a1428
-
Filesize
4KB
MD50e86ee3664f80f8b029172f4847653cc
SHA16d9a7f6d4f9f9d70cddff96579f6fce5ec662ff5
SHA256ddb8a8bf29ad960cce884b77b9558ab73b8708283f49a73899ab0b404f9a6419
SHA5127f181e383c5f87a24fa08281345ace58e087b3b8d20a776cbd77022ce310ee2eb475bddd6cefa7d7e939eb02e6fa496e782cbc2e3f2f68d2be434cec0f6e2e79
-
Filesize
1KB
MD5eec14507d57edcde8f950ca150fa0c29
SHA1b5205530536c945fb3f01a74a7b787bdaac9ba5c
SHA256d00d9a240b135e9eafce4f365dcf61805c8592de87995b94bc1884c9e115602b
SHA5124c9809ea885404a03a2ad5d40ebc4599821f0d51e4974fe0eccfd8b6093ece94b6bb88f62f7dae8c564e04aa437a1b66bd350f4854c51f3d0fba31b412d88e73
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5969b6317f364c8e16c5a03bc9db8f8d5
SHA1483f384da56f568ff3c03e69c46371c9dd420850
SHA256a748d3f5c9a396594ae8f9e335fe4df9e7b29e7902f91fb3c3dd9bc663cf64f4
SHA51275a9d24c624f494bfbd900479a300a629db8364084e12dd0d6799364d2e722aded9dea169ff1181110f4a9c79a2caedcc65fd8daa9b60a0d5db8e84b57dedf34
-
Filesize
11KB
MD5eff67dcdf52e62e9e7b993b0641c286a
SHA107caed7c03947a7bbda9e8ecc547d3f7536f7045
SHA256128cd0ade2482155993c13ccb3f42d63d02dfe96530057beca05f2a9c06fe503
SHA512613088c3c5be65eacba7dbd2d7f9893b10086076fccb6b478dae3fd5c35c47e854ac3db8aea48f106e154bb8401a45a41b8de8971db5fb4bc4a65e768d49ed44
-
Filesize
11KB
MD55cd84733859081657eb65b0e020a7ce5
SHA1c0352e62d473762078f8997fb0ab67c5b9455ace
SHA25658e211c7edd2e0094eb8223ae0030df4047b13fe7453b0a065be23c6c30a2d7b
SHA51297c613e59c068e363216b63ea99a50524e5c47f97777872031c4abea0c96e171bf88ddf63dab592fce8000170f268e2871dc421f78055829792bdf4cdb5f95c2
-
Filesize
11KB
MD5098eaf4f962b104a27b834ca670cbb97
SHA1df853e8138df15d77a7d6b25c6959aabc36a2c7c
SHA256287113f3614922ed79092cec55bd9242588b3d04ca804a9fad46cf39a30d96ef
SHA51255ad026b954686ec730ccf325e95614c0e227da1fd7ead0ae534073eafc831870ee898ad9071e0747a045954ba94a7647ad805d71769e3d91a957d4def413e48
-
Filesize
11KB
MD5dd63981156f36fc8bb0a70ca851251a9
SHA11b1fe83ac87642486355e7c136f6d9d902e65508
SHA25666c149f35bf92f861019d76ef031421c69b6a6873a73a5befa85f89db9e566d3
SHA512b107307799dfb2f009a9e55f1225e405db36278c76549b4411f6e0cc8e8e357005a871c1c40f2bce21d230bcfba62d8d8424bcbc9d111739c4d7dca7963f8a54
-
Filesize
11KB
MD5980b9ba8d1491997489d576aaace31d9
SHA12fc9f94b822d3535847fc8e9e3622bd791fd1646
SHA25691d9f0557e39e2e2b6ab1884ec48fb7c0878708053761c2431991750b930323d
SHA512e67e56d1fe82cbaca8704e6ae9f35d043f9616fc1246d85423ed095f4a4021369338b92c3bffa04bb159b8d6eef398cb6ef429f7f4ca504feffa277276563b10
-
Filesize
11KB
MD592d3a18d56202b95d371b47a17deef07
SHA10c4dc9e7325a457ad3a8de00df2be0a3708793b0
SHA256bf780a91d4ef68ddc295fa78fdc545eef01016e839709c44b0ebcaa2976730cb
SHA512dd8a6465ed27e2bdd35d5a620bea4b4ca5f24c39cf4f064af9eba0091a35785f76845be1657d027c906133787c6735d8e774eab5731f1f498b88940c12552a99
-
Filesize
11KB
MD5621944d946a6c19f08579bdf7ba1d3d4
SHA1ac09644fb48690b7d7749690c09aa77384dad301
SHA25698289c97da493b301db397e1b7a548fa5de66c15f3b3a83e58bf766dfc182fe4
SHA512be898930a6b241ac8e8edb067bb61eb164227825aae94531f4292a4e96ea1111b4dc7bfcfee9ee4cf58edcbe3b77d70ae7ab482016dc0e05e3482a536cf6a7b9
-
Filesize
10KB
MD5d0cf306fc7f46a63dbef0534cbd78488
SHA1287de36d972f7e98559447626a00e7ca45ea68c6
SHA256af802c8725bf4914321651fde913db04a9988cf62db9fd7233adcfcadf811154
SHA512029665796df8aa23926457a57d83ce8c1d5d9211e3e1b656a75d5f67f440d7b71d4e4b6ef10886927eb80cf4dc02a11cbb6e7d37f700c7f3c324b5d8b057d260
-
Filesize
11KB
MD538b44a7dc546bba85549394142d7e839
SHA1571a5255013f8e82d9eb54a31bc4d1a23301a3c6
SHA2561ab9d249d0681385ae3c2b5bcd02f0e1ca5a987c5c11637f0b5544211186d6b2
SHA512d0f5d2b59a1e6ab4097af84497f70d7ad7f70e4488f44b596df5bcc8d691dddf37668638af6c660c0e0514d5f99f1eb8857d53163728ecdcf05d0101c5599203
-
Filesize
11KB
MD5f4eb0480810de6b1be460c38ca7ca2f7
SHA139c76df4e012875f77b9999af9ffb27207e327cc
SHA256e06323935147499681f109d91d3889bdf6ae0301e361bba7b5f9616c9672a13c
SHA5124fc8a90fbecce33a4734a825d0abce0c29fdf0998698351573f4050b4a610a4313232a710d1e2990e073e5c2cc7cba1cce267fe7ed411ffaf517cbc6f02ad17e
-
Filesize
11KB
MD5719609e86d0975df5eb5d0df678583da
SHA1a1d0541392e90fc39dadca6a09aa30ed5a4e39e1
SHA256cf3925f1638f59766ba85e1a78ab55868748e7a37dbcb85381408480dd79f255
SHA512838b354dd500ce5dba1b9c541ccb73cdfd6ce966988aca11135afafcbb0ff95fa3b5be9e494671aac7152b0ad61c0a3a96e71c0ae9b05e42f870ccb972bd0248
-
Filesize
11KB
MD57f735fd8b8af1d4e47534c452c1e1aac
SHA186104c094fb866827ffc54e42e02cc0baba574b7
SHA25671d81970dac7fadc03d85c6a28e338fda6243a830f00376b0cab51485b70454a
SHA51283b233f083ad234061a867dc450178e57ad9472c47b756b2de05060db20500e319468c785577c854b07c50805cd399bdee05d4b6245f1cb79443de51429ca5ca
-
Filesize
11KB
MD56eebf4435f7e44ad20f1c815495e75e6
SHA10dd1f0d8da5b18a2289774c0ba8228d10210fc74
SHA256e157fabed204c8c7ffacb793f248fd754210e36909030195263283f3a6c19dce
SHA5121e4ee5afbe439d38bcf5d53bfce2334a453f5d1de204e2af9d9f5c7e12aa9d5439929029c8e402c59154d1df7492ff41ddebe3368f0565d777125ef76b3ab6a8
-
Filesize
11KB
MD582f41b2b91fd5e4d4bea28a2ae64af52
SHA16a31492bd272e80d304146fdacbdca99323d3597
SHA256293855a7db70c1c4ba12ec7f93675b56d5d60968fae6514d7947297df3fc9f1f
SHA5129ca2aca1350e61030e2a0428e37f5e39403263d98bc0fd63d392ae70534890271e1fd586cb990358339c9502877195d9f7c8f44a0e3fa7fd80b5c9d882b98679
-
Filesize
11KB
MD54af6080684db4fb7ef1c5b7ebb2ed5e6
SHA168105bcc4cbf65558bfb1c097a7ba59aaf8c7ce7
SHA256ddd289f404b688d5166624ba6192df509034013ba2bf95c75178959320ed8ad8
SHA512be660b8f9d21a0dc8e4eea4c18cb3a40627746b24b00d3ea3e4b44de63fe52f98d3639e979006a9910110391f41e6f146a012eba7a19c797235f33943f97b76c
-
Filesize
11KB
MD5e3eed80cfbde91e75294717e9fcc5363
SHA1a614312450e6ff8bf2ebcee051beb6f29c3197cf
SHA2567b0fe49142f8f21a6fd4bf31d8dc02e487821c3f09984a4a6020346108051ecb
SHA51212f153a069004ee6c18df710f21393d542bfd3d8b0f04d664ac4c9eda244976858c4c9ce300abae464bc8688dc59b63c425b91f95966d5c99cf19c59f43ce45c
-
Filesize
11KB
MD5c184280cdfc9b82fe52d5c8c4d3bdfc1
SHA1df1787c6607850c9b0491e4a04c53e625a82c19f
SHA256ea32719c5cc207c702f83f0ffc88131411de6c1bdce5e5d906d56d50759b8e8f
SHA51288edc92fd966443a527615d32235e203a4a687cce5f122dea225095b8150bb0b2bac5e39329e4bbe5ba90ec27bc62b774b2b59038865b71d3881aff5e3e15c59
-
Filesize
11KB
MD5d5a93f6675afbcd1418baf802fca2dea
SHA16662db90ee22a2a8d24db69fa2096fcd5cfc2fa4
SHA2561f2bc124312605500b570ab22ae9f5898feca2e31d69c5bdb7371aa236f54388
SHA512c48cd89a8f7e30f17375f8b3aa80137591531a5f69dc9d5b65af3bb99ef4768eab46d3ca5dbed00d0a6b7cb568bf8b88f10f4cf9013aeceb5da696a7450197bd
-
Filesize
11KB
MD51882f3dd051e401349f1af58d55b0a37
SHA16b0875f9e3164f3a9f21c1ec36748a7243515b47
SHA2563c8cea1a86f07b018e637a1ea2649d907573f78c7e4025ef7e514362d09ff6c0
SHA512fec96d873997b5c6c82a94f8796c88fc2dd38739277c517b8129277dcbda02576851f1e27bdb2fbb7255281077d5b9ba867f6dfe66bedfc859c59fdd3bbffacf
-
Filesize
4KB
MD5214f98cb6a54654a4ca5c456f16aed0a
SHA12229090d2f6a1814ba648e5b5a5ae26389cba5a0
SHA25645f18ccd8df88c127304a7855a608661b52b0ca813e87e06d87da15259c45037
SHA5125f058b05f166e2688df7b3960e135ada25bbcdfbb62a11da3cf9e70c08c51e5589a1e6ca2250318a694d27197f2c5ba1028c443831c43fba2171ca8e072e9873
-
Filesize
448B
MD58eec8704d2a7bc80b95b7460c06f4854
SHA11b34585c1fa7ec0bd0505478ac9dbb8b8d19f326
SHA256aa01b8864b43e92077a106ed3d4656a511f3ba1910fba40c78a32ee6a621d596
SHA512e274b92810e9a30627a65f87448d784967a2fcfbf49858cbe6ccb841f09e0f53fde253ecc1ea0c7de491d8cc56a6cf8c79d1b7c657e72928cfb0479d11035210
-
Filesize
8KB
MD563ee4412b95d7ad64c54b4ba673470a7
SHA11cf423c6c2c6299e68e1927305a3057af9b3ce06
SHA25644c1857b1c4894b3dfbaccbe04905652e634283dcf6b06c25a74b17021e2a268
SHA5127ff153826bd5fed0a410f6d15a54787b79eba927d5b573c8a7f23f4ecef7bb223d79fd29fe8c2754fbf5b4c77ab7c41598f2989b6f4c7b2aa2f579ef4af06ee7
-
Filesize
14KB
MD519dbec50735b5f2a72d4199c4e184960
SHA16fed7732f7cb6f59743795b2ab154a3676f4c822
SHA256a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d
SHA512aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d
-
Filesize
218B
MD5afa6955439b8d516721231029fb9ca1b
SHA1087a043cc123c0c0df2ffadcf8e71e3ac86bbae9
SHA2568e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270
SHA5125da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf