Resubmissions

10-04-2024 19:04

240410-xrc4tsca3w 7

10-04-2024 18:53

240410-xjnwcsbf7t 7

10-04-2024 18:50

240410-xhb56sbf21 1

10-04-2024 18:40

240410-xbpspabd2s 10

10-04-2024 18:37

240410-w9s3bsgb72 8

10-04-2024 18:27

240410-w3qzdsba5v 4

10-04-2024 18:24

240410-w15d1afh52 1

10-04-2024 18:13

240410-wtrjkaff78 1

10-04-2024 18:07

240410-wqcw1aaf4x 6

Analysis

  • max time kernel
    442s
  • max time network
    444s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-04-2024 18:40

Errors

Reason
Machine shutdown

General

  • Target

    sample.html

  • Size

    18KB

  • MD5

    975aed651740cac29bc0fa6e3992d3cc

  • SHA1

    42033f32c97b6be4e446c0a77690745eafc28112

  • SHA256

    c7a53cef7508f2abb86996be29a075c2ea63bf09b1bb08e1b1b7a592cf074e60

  • SHA512

    53a57fbf3952c5f0e08781879747d059d27a81f58c3f1a9f38c8763ba7aa8d31849e9797092c7624311b626e9aedd4937956bdefc54350ade3d480b04d1eb87d

  • SSDEEP

    384:rTqN2DpmReVoOs41N9ylKeGM+U8HhhbG167uS2LjFrSE3+dVJCBXQL:rTqYBVoOs41ryI1M0Bhb68CFrSEMJQQL

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 4 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Possible privilege escalation attempt 4 IoCs
  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 3 IoCs
  • Modifies file permissions 1 TTPs 4 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Obfuscated with Agile.Net obfuscator 4 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Program Files directory 37 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies data under HKEY_USERS 15 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 28 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\sample.html
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3bcf46f8,0x7ffa3bcf4708,0x7ffa3bcf4718
      2⤵
        PID:3628
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:2
        2⤵
          PID:1508
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4732
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:8
          2⤵
            PID:972
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:1
            2⤵
              PID:1084
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:1
              2⤵
                PID:4004
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:8
                2⤵
                  PID:4440
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3644
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:1
                  2⤵
                    PID:3956
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:1
                    2⤵
                      PID:2972
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:1
                      2⤵
                        PID:1700
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:1
                        2⤵
                          PID:724
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:1
                          2⤵
                            PID:4744
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:1
                            2⤵
                              PID:4392
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:1
                              2⤵
                                PID:5012
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:1
                                2⤵
                                  PID:4504
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5640 /prefetch:8
                                  2⤵
                                    PID:4340
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5632 /prefetch:8
                                    2⤵
                                    • Modifies registry class
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:1800
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:1
                                    2⤵
                                      PID:3152
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:1
                                      2⤵
                                        PID:5048
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5980 /prefetch:1
                                        2⤵
                                          PID:2892
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4044 /prefetch:1
                                          2⤵
                                            PID:4756
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
                                            2⤵
                                              PID:1744
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3744 /prefetch:1
                                              2⤵
                                                PID:1572
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5772 /prefetch:8
                                                2⤵
                                                  PID:5036
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6312 /prefetch:1
                                                  2⤵
                                                    PID:4712
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6212 /prefetch:1
                                                    2⤵
                                                      PID:4524
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6224 /prefetch:1
                                                      2⤵
                                                        PID:4632
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:1
                                                        2⤵
                                                          PID:1716
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5860 /prefetch:8
                                                          2⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:1668
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:1
                                                          2⤵
                                                            PID:804
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5500 /prefetch:2
                                                            2⤵
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:1276
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6740558350270307245,3512944941788186451,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:1
                                                            2⤵
                                                              PID:2720
                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                            1⤵
                                                              PID:4040
                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                              1⤵
                                                                PID:1852
                                                              • C:\Windows\System32\rundll32.exe
                                                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                1⤵
                                                                  PID:368
                                                                • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\rickroll.exe
                                                                  "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\rickroll.exe"
                                                                  1⤵
                                                                    PID:3100
                                                                  • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\rickroll.exe
                                                                    "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\rickroll.exe"
                                                                    1⤵
                                                                      PID:3880
                                                                    • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\rickroll.exe
                                                                      "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\rickroll.exe"
                                                                      1⤵
                                                                        PID:1276
                                                                      • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\ChilledWindows.exe
                                                                        "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\ChilledWindows.exe"
                                                                        1⤵
                                                                        • Enumerates connected drives
                                                                        • Modifies registry class
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:924
                                                                      • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\ChilledWindows.exe
                                                                        "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\ChilledWindows.exe"
                                                                        1⤵
                                                                        • Enumerates connected drives
                                                                        • Modifies registry class
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:4500
                                                                      • C:\Windows\system32\AUDIODG.EXE
                                                                        C:\Windows\system32\AUDIODG.EXE 0x150 0x31c
                                                                        1⤵
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:2092
                                                                      • C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE
                                                                        "C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\Desktop\SkipCompare.ppsm" /ou ""
                                                                        1⤵
                                                                        • Checks processor information in registry
                                                                        • Enumerates system info in registry
                                                                        • Suspicious behavior: AddClipboardFormatListener
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:3184
                                                                      • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\WindowsUpdate.exe
                                                                        "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\WindowsUpdate.exe"
                                                                        1⤵
                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                        • Suspicious use of SendNotifyMessage
                                                                        PID:5076
                                                                      • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\Curfun.exe
                                                                        "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\Curfun.exe"
                                                                        1⤵
                                                                          PID:2872
                                                                        • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\MrsMajors\MrsMajor3.0.exe
                                                                          "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\MrsMajors\MrsMajor3.0.exe"
                                                                          1⤵
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:4900
                                                                          • C:\Windows\system32\wscript.exe
                                                                            "C:\Windows\system32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\E70C.tmp\E70D.tmp\E70E.vbs //Nologo
                                                                            2⤵
                                                                            • UAC bypass
                                                                            • Checks computer location settings
                                                                            • System policy modification
                                                                            PID:676
                                                                            • C:\Users\Admin\AppData\Local\Temp\E70C.tmp\eulascr.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\E70C.tmp\eulascr.exe"
                                                                              3⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:2460
                                                                        • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\MrsMajors\MrsMajor3.0.exe
                                                                          "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\MrsMajors\MrsMajor3.0.exe"
                                                                          1⤵
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:1452
                                                                          • C:\Windows\system32\wscript.exe
                                                                            "C:\Windows\system32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\1659.tmp\165A.tmp\165B.vbs //Nologo
                                                                            2⤵
                                                                            • UAC bypass
                                                                            • Checks computer location settings
                                                                            • System policy modification
                                                                            PID:3132
                                                                            • C:\Users\Admin\AppData\Local\Temp\1659.tmp\eulascr.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\1659.tmp\eulascr.exe"
                                                                              3⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:1692
                                                                        • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\MrsMajors\MrsMajor3.0.exe
                                                                          "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\MrsMajors\MrsMajor3.0.exe"
                                                                          1⤵
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:1532
                                                                          • C:\Windows\system32\wscript.exe
                                                                            "C:\Windows\system32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\27AF.tmp\27B0.tmp\27B1.vbs //Nologo
                                                                            2⤵
                                                                            • UAC bypass
                                                                            • Checks computer location settings
                                                                            • System policy modification
                                                                            PID:180
                                                                            • C:\Users\Admin\AppData\Local\Temp\27AF.tmp\eulascr.exe
                                                                              "C:\Users\Admin\AppData\Local\Temp\27AF.tmp\eulascr.exe"
                                                                              3⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:4088
                                                                        • C:\Program Files\7-Zip\7zFM.exe
                                                                          "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\MrsMajors\MrsMajor2.0.7z"
                                                                          1⤵
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:3152
                                                                          • C:\Users\Admin\AppData\Local\Temp\7zO05CF122D\MrsMajor2.0.exe
                                                                            "C:\Users\Admin\AppData\Local\Temp\7zO05CF122D\MrsMajor2.0.exe"
                                                                            2⤵
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            PID:4388
                                                                            • C:\Windows\system32\wscript.exe
                                                                              "C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\7429.tmp\742A.vbs
                                                                              3⤵
                                                                              • Modifies WinLogon for persistence
                                                                              • UAC bypass
                                                                              • Disables RegEdit via registry modification
                                                                              • Checks computer location settings
                                                                              • Modifies system executable filetype association
                                                                              • Adds Run key to start application
                                                                              • Drops file in Program Files directory
                                                                              • Modifies Control Panel
                                                                              • Modifies registry class
                                                                              • System policy modification
                                                                              PID:232
                                                                              • C:\Windows\System32\cmd.exe
                                                                                "C:\Windows\System32\cmd.exe" /c cd\&cd "C:\Users\Admin\AppData\Local\Temp" & eula32.exe
                                                                                4⤵
                                                                                  PID:3620
                                                                                  • C:\Users\Admin\AppData\Local\Temp\eula32.exe
                                                                                    eula32.exe
                                                                                    5⤵
                                                                                    • Executes dropped EXE
                                                                                    PID:1828
                                                                                • C:\Program Files\MicrosoftWindowsServicesEtc\GetReady.exe
                                                                                  "C:\Program Files\MicrosoftWindowsServicesEtc\GetReady.exe"
                                                                                  4⤵
                                                                                  • Checks computer location settings
                                                                                  • Executes dropped EXE
                                                                                  PID:1604
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1\B8C3.bat "C:\Program Files\MicrosoftWindowsServicesEtc\GetReady.exe""
                                                                                    5⤵
                                                                                    • Drops file in System32 directory
                                                                                    PID:4584
                                                                                    • C:\Windows\System32\takeown.exe
                                                                                      takeown /f taskmgr.exe
                                                                                      6⤵
                                                                                      • Possible privilege escalation attempt
                                                                                      • Modifies file permissions
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:784
                                                                                    • C:\Windows\System32\icacls.exe
                                                                                      icacls taskmgr.exe /granted "Admin":F
                                                                                      6⤵
                                                                                      • Possible privilege escalation attempt
                                                                                      • Modifies file permissions
                                                                                      PID:4556
                                                                                    • C:\Windows\System32\takeown.exe
                                                                                      takeown /f sethc.exe
                                                                                      6⤵
                                                                                      • Possible privilege escalation attempt
                                                                                      • Modifies file permissions
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:676
                                                                                    • C:\Windows\System32\icacls.exe
                                                                                      icacls sethc.exe /granted "Admin":F
                                                                                      6⤵
                                                                                      • Possible privilege escalation attempt
                                                                                      • Modifies file permissions
                                                                                      PID:696
                                                                                • C:\Program Files\MicrosoftWindowsServicesEtc\notmuch.exe
                                                                                  "C:\Program Files\MicrosoftWindowsServicesEtc\notmuch.exe"
                                                                                  4⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:3248
                                                                                • C:\Windows\System32\shutdown.exe
                                                                                  "C:\Windows\System32\shutdown.exe" -r -t 5
                                                                                  4⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:4004
                                                                          • C:\Windows\system32\LogonUI.exe
                                                                            "LogonUI.exe" /flags:0x4 /state0:0xa3902855 /state1:0x41c64e6d
                                                                            1⤵
                                                                            • Modifies data under HKEY_USERS
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:1928
                                                                          • C:\Windows\System32\rundll32.exe
                                                                            C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
                                                                            1⤵
                                                                              PID:1120

                                                                            Network

                                                                            MITRE ATT&CK Enterprise v15

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • C:\Program Files\MicrosoftWindowsServicesEtc\GetReady.exe

                                                                              Filesize

                                                                              52KB

                                                                              MD5

                                                                              57f3795953dafa8b5e2b24ba5bfad87f

                                                                              SHA1

                                                                              47719bd600e7527c355dbdb053e3936379d1b405

                                                                              SHA256

                                                                              5319958efc38ea81f61854eb9f6c8aee32394d4389e52fe5c1f7f7ef6b261725

                                                                              SHA512

                                                                              172006e8deed2766e7fa71e34182b5539309ec8c2ac5f63285724ef8f59864e1159c618c0914eb05692df721794eb4726757b2ccf576f0c78a6567d807cbfb98

                                                                            • C:\Program Files\MicrosoftWindowsServicesEtc\NotMuch.exe

                                                                              Filesize

                                                                              122KB

                                                                              MD5

                                                                              87a43b15969dc083a0d7e2ef73ee4dd1

                                                                              SHA1

                                                                              657c7ff7e3f325bcbc88db9499b12c636d564a5f

                                                                              SHA256

                                                                              cf830a2d66d3ffe51341de9e62c939b2bb68583afbc926ddc7818c3a71e80ebb

                                                                              SHA512

                                                                              8a02d24f5dab33cdaf768bca0d7a1e3ea75ad515747ccca8ee9f7ffc6f93e8f392ab377f7c2efa5d79cc0b599750fd591358a557f074f3ce9170283ab5b786a1

                                                                            • C:\Program Files\MicrosoftWindowsServicesEtc\example.txt

                                                                              Filesize

                                                                              302B

                                                                              MD5

                                                                              8837818893ce61b6730dd8a83d625890

                                                                              SHA1

                                                                              a9d71d6d6d0c262d41a60b6733fb23cd7b8c7614

                                                                              SHA256

                                                                              cc6d0f847fde710096b01abf905c037594ff4afae6e68a8b6af0cc59543e29bb

                                                                              SHA512

                                                                              6f17d46098e3c56070ced4171d4c3a0785463d92db5f703b56b250ab8615bcb6e504d4c5a74d05308a62ea36ae31bc29850187943b54add2b50422fb03125516

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\eulascr.exe.log

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              8b325485d0cc4762f87c0857e27c0e35

                                                                              SHA1

                                                                              1514778327d7c7b705dbf14f22ff9d8bdfdca581

                                                                              SHA256

                                                                              c18709d3ab63bebbbeba0791cd188db4121be8007c896a655d7f68535026cadf

                                                                              SHA512

                                                                              9bf9da14e50301d68246dc9f3a21319a8fbfc866d5b57ee44cd9ed96c1a6dfecabcec06b66be5ec5625ff708d460e23d00849c581957ab84c4f2941cee07ff33

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              9ffb5f81e8eccd0963c46cbfea1abc20

                                                                              SHA1

                                                                              a02a610afd3543de215565bc488a4343bb5c1a59

                                                                              SHA256

                                                                              3a654b499247e59e34040f3b192a0069e8f3904e2398cbed90e86d981378e8bc

                                                                              SHA512

                                                                              2d21e18ef3f800e6e43b8cf03639d04510433c04215923f5a96432a8aa361fdda282cd444210150d9dbf8f028825d5bc8a451fd53bd3e0c9528eeb80d6e86597

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              e1b45169ebca0dceadb0f45697799d62

                                                                              SHA1

                                                                              803604277318898e6f5c6fb92270ca83b5609cd5

                                                                              SHA256

                                                                              4c0224fb7cc26ccf74f5be586f18401db57cce935c767a446659b828a7b5ee60

                                                                              SHA512

                                                                              357965b8d5cfaf773dbd9b371d7e308d1c86a6c428e542adbfe6bac34a7d2061d0a2f59e84e5b42768930e9b109e9e9f2a87e95cf26b3a69cbff05654ee42b4e

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\02c6fc1f-6c79-40e9-878d-4ee560dfe670.tmp

                                                                              Filesize

                                                                              6KB

                                                                              MD5

                                                                              18c64591e6665650b40205b3d91476c9

                                                                              SHA1

                                                                              7e2f994bb4db23717787591e3dd6d1c71a43ca17

                                                                              SHA256

                                                                              2a30bd5c6d9f6d3da063e65d9a22fcbf90157128639c40636ab410694ba91e64

                                                                              SHA512

                                                                              63ca3fc44849570e287477b881029238f4333505a29a46456fc280c97f959ef5f2dca038048e19ad5ba777db64e61c66c2d6894100ecab3bc08b12ca509e8d78

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\115252d8-30c2-42b0-89c8-5305b92afe88.tmp

                                                                              Filesize

                                                                              6KB

                                                                              MD5

                                                                              de09ba3d0b27e16c733404152504146d

                                                                              SHA1

                                                                              8452594d7c76764b42e952b2253e35081015e7a1

                                                                              SHA256

                                                                              045802e91f79d9a199305a5f650db3c6d4e5294284b41f781497c3c38a1fb417

                                                                              SHA512

                                                                              266c38df01fdedaa537c23bf3394fb99eef06e615fa2abe6d3931fa2fb73013e8150bf4c2f3ab60007a0173cd07c2025f50de074fe130f12e9519546df6911cd

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\7aa6baf3-af23-49ec-b346-b0cff82b8f1a.tmp

                                                                              Filesize

                                                                              6KB

                                                                              MD5

                                                                              cfa786a05392d1bc1e85bfd04eaddbbd

                                                                              SHA1

                                                                              2586b9055f5811c568602fa8b95769a7843b966e

                                                                              SHA256

                                                                              574451ca07428e8929e913d13b41990b71143882b4845c81cc9b98a5471e4011

                                                                              SHA512

                                                                              32c714203f7376bf20b4c29798614b92595ede18721f7250bc74e76ba6003ff186d01ba1809ce0ad3fdb793cc1499a3557a83c921e45bc7d966d67311b50c859

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004

                                                                              Filesize

                                                                              64KB

                                                                              MD5

                                                                              d6b36c7d4b06f140f860ddc91a4c659c

                                                                              SHA1

                                                                              ccf16571637b8d3e4c9423688c5bd06167bfb9e9

                                                                              SHA256

                                                                              34013d7f3f0186a612bef84f2984e2767b32c9e1940df54b01d5bd6789f59e92

                                                                              SHA512

                                                                              2a9dd9352298ec7d1b439033b57ee9a390c373eeb8502f7f36d6826e6dd3e447b8ffd4be4f275d51481ef9a6ac2c2d97ef98f3f9d36a5a971275bf6cee48e487

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

                                                                              Filesize

                                                                              67KB

                                                                              MD5

                                                                              d2d55f8057f8b03c94a81f3839b348b9

                                                                              SHA1

                                                                              37c399584539734ff679e3c66309498c8b2dd4d9

                                                                              SHA256

                                                                              6e273f3491917d37f4dbb6c3f4d3f862cada25c20a36b245ea7c6bd860fb400c

                                                                              SHA512

                                                                              7bcdbb9e8d005a532ec12485a9c4b777ddec4aee66333757cdae3f84811099a574e719d45eb4487072d0162fa4654349dd73705a8d1913834535b1a3e2247dc6

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000006

                                                                              Filesize

                                                                              35KB

                                                                              MD5

                                                                              a053b626552864ee4e93f684617be84c

                                                                              SHA1

                                                                              977f090d070e793072bfb7dce69812dc41883d4e

                                                                              SHA256

                                                                              25b3ad881a0a88c6228e12688078638fe0b96210d0f0e20721e3c911a5b37dd4

                                                                              SHA512

                                                                              f7b444b1a1c465a4614cd1b9bd678875251f44e227abaaaf1fa6b35bb67bb25932b9b11cc8fabd19d2d5d6e80c6ad0b15149869e6e41f6345db3d49f08683e36

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000007

                                                                              Filesize

                                                                              19KB

                                                                              MD5

                                                                              2e86a72f4e82614cd4842950d2e0a716

                                                                              SHA1

                                                                              d7b4ee0c9af735d098bff474632fc2c0113e0b9c

                                                                              SHA256

                                                                              c1334e604dbbffdf38e9e2f359938569afe25f7150d1c39c293469c1ee4f7b6f

                                                                              SHA512

                                                                              7a5fd3e3e89c5f8afca33b2d02e5440934e5186b9fa6367436e8d20ad42b211579225e73e3a685e5e763fa3f907fc4632b9425e8bd6d6f07c5c986b6556d47b1

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000008

                                                                              Filesize

                                                                              65KB

                                                                              MD5

                                                                              56d57bc655526551f217536f19195495

                                                                              SHA1

                                                                              28b430886d1220855a805d78dc5d6414aeee6995

                                                                              SHA256

                                                                              f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4

                                                                              SHA512

                                                                              7814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000009

                                                                              Filesize

                                                                              88KB

                                                                              MD5

                                                                              b38fbbd0b5c8e8b4452b33d6f85df7dc

                                                                              SHA1

                                                                              386ba241790252df01a6a028b3238de2f995a559

                                                                              SHA256

                                                                              b18b9eb934a5b3b81b16c66ec3ec8e8fecdb3d43550ce050eb2523aabc08b9cd

                                                                              SHA512

                                                                              546ca9fb302bf28e3a178e798dd6b80c91cba71d0467257b8ed42e4f845aa6ecb858f718aac1e0865b791d4ecf41f1239081847c75c6fb3e9afd242d3704ad16

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000a

                                                                              Filesize

                                                                              1.1MB

                                                                              MD5

                                                                              b36bf0bc042f10f9061a6f5e555b2dca

                                                                              SHA1

                                                                              76a0b3e1af74adbd78d75d93bc7bf38d4caae779

                                                                              SHA256

                                                                              db2243add96c4820c823ce724ea39b818179f8b3bd35d5f30830300640a5df5a

                                                                              SHA512

                                                                              742be95e1469fcf9dd4d3c3a68b9be6c90186f05f04bdc61b9bec4bf20469b1cbe2ca7a2909f661f64ee385837ee31789b98cd6a78fd3f3a1d169ab5d20fb1c3

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                              Filesize

                                                                              3KB

                                                                              MD5

                                                                              41a772ce05a03cff2b97c46e79f9008d

                                                                              SHA1

                                                                              fe0af3a635fb6a543db78407b657fd54d38d7159

                                                                              SHA256

                                                                              a0fb80608e9d4144a35fe939a1e92f0bf0837c9ebdfba8f54ddd3a6bd7141e90

                                                                              SHA512

                                                                              34bd9fb98388f8497b8bdd3d01effebbd7b8a377546c9e34af925f7724b85332053af3c073c73f593104b5e9eaa4871c7ccc4e418ff6b23fec23e5637e017ff4

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                              Filesize

                                                                              3KB

                                                                              MD5

                                                                              66f0c739ed70c07f0381af69ac51f1a3

                                                                              SHA1

                                                                              ca3ca5db29f6d74717269237e2d155faea33039d

                                                                              SHA256

                                                                              57526dc9d4cd23bcbebecafbf7f0ad3b398ef846ac0f3e7e3a1cec482a791bbb

                                                                              SHA512

                                                                              3c0bcfe263b4fb63596ecb3c810b0bdba73c00bfb1c0e1147a2464a13fb72a97c4253de99822ee24487c402be4dc7eb1c0561b23a5e95eda3f0c71db2a9aa904

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                              Filesize

                                                                              861B

                                                                              MD5

                                                                              7911cda0bd7b9df06c1efedcc25535fb

                                                                              SHA1

                                                                              4b09ddfb1d68a010ddb72d9d283bd084eeb3dd3e

                                                                              SHA256

                                                                              d8ae2d36aa6b9a587bf54bb9e8c0e10488a061f1dedea32cc91e957378f90582

                                                                              SHA512

                                                                              0b206cc232873c5a0a1254450e300702b9857d9b1c747f11ccdaadf600ea6350ee7de20b16b76505fff289d2f4ac83c4cd16f8640a296c9ae94dac5715b7224b

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              9026da70c651f663462e0eb7d5c04167

                                                                              SHA1

                                                                              6ee014e56e4e5ec182106b7d383f1a396ae76e9d

                                                                              SHA256

                                                                              61249a7f57d8f79ff5801f7a5b09351a81c0ee336fc93ae4f12774f3b84b3cb2

                                                                              SHA512

                                                                              eb1cc2446955e54969d71bd9f3d2daea2df0292b23e1404232aef3ff4c594c74ee01f7cc14dbd1eaae2035f51e4117e8b9e21fe30273ed53e915ba4e46dd2097

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                              Filesize

                                                                              7KB

                                                                              MD5

                                                                              bf1541a123599adce2a337b15c724fe8

                                                                              SHA1

                                                                              03f456a445738efab23f08eadea4ba8f5cd0f723

                                                                              SHA256

                                                                              bff1e31d8cc8a4ee95c27cd1687b345a04de85267f625c335b141eae4b1c4e42

                                                                              SHA512

                                                                              953c394cbeb6ddd27ab379315e33e7cdb458a088c26877c5307eaf109b8e6ef44c184b1d227dbcd7d0fd8fcefd3f5fd161d56bed27bab73694696c02722817d5

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                              Filesize

                                                                              7KB

                                                                              MD5

                                                                              27302ac7deeb90dca8e8b6389fbd3ea5

                                                                              SHA1

                                                                              8249cf8c8c9667505856fd6091cde3ba628ce61b

                                                                              SHA256

                                                                              5ee0eeca16b3761788f57b4121693ba582a8c48181939e314d6fd4c491000ed7

                                                                              SHA512

                                                                              3007d1acd738b38fd0effcdbf583834c768a6c585cf118d076dc44bbd7198ece48eeda87ceaa6b947d00682496ccdbfa081924b7e6ede202c582400f4ebf4653

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                              Filesize

                                                                              6KB

                                                                              MD5

                                                                              c44e32ab28c1743995e8411aa0c9bb5f

                                                                              SHA1

                                                                              96c20978de8e29c91ba33639f86feb014bc11652

                                                                              SHA256

                                                                              534e4d813d344d3a4749585b10641638847db340c192f9cc3190462a5b2573d6

                                                                              SHA512

                                                                              84df8549caedfd4feb1f44f6ba9540a6ce3c459b205f9e0bd24fbc8c56807f21305d908187a9ee664710cb138317543f3ea1750941aa008e1c2856d04620466c

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                              Filesize

                                                                              6KB

                                                                              MD5

                                                                              676b287debd0a24e250da2d96c566a8f

                                                                              SHA1

                                                                              2ddb4470fb41cc7909a7d7715e2c8417d287ec43

                                                                              SHA256

                                                                              b8c8f22750bc215b805bb344adf2e46b8c7849e2bd81d2e5b5c95ea968ccff63

                                                                              SHA512

                                                                              899277e330def64d9c4bc403d5c42df926e5e995e5a806fa8aa202f83165f18026c06eba04ce58eca04c5ab40d57d5aec0c2a0ee1bc3beeeb65e397a4245ba31

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                              Filesize

                                                                              6KB

                                                                              MD5

                                                                              6cf9ec0c774ce2cc1abe965ca66d287d

                                                                              SHA1

                                                                              bf0161a0a551d76e8f61cafe9351ffb6c2dcb3d8

                                                                              SHA256

                                                                              7b075458dac95a446a49f79389baf6e5b7f5768061f018f4a38d756f09e9fe28

                                                                              SHA512

                                                                              0b815ae8d6a4110e3d8d5fb32e5d0e9783c94901df178d3cf06bcb12041ab73134e3b577289ebb21ac9c0b998c0af8ffc505cc5295f58b5faa9825aa93b3c9bb

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              42d26d9c3ef78139fd8c786de478d5af

                                                                              SHA1

                                                                              b586d12b8eb1de96d81ea9f3f446d52a9831f6fd

                                                                              SHA256

                                                                              57787b83cdb4501effd83cd88e0c425e5cafb6118bc5dfe7866c136c0ac33dc5

                                                                              SHA512

                                                                              1840e3e21d4c54de09fb0c67aaeef0b61557da48b6e348fc583669d22190b0b440f6c5069af2523e2fd9b376c382cba15a15f9052bdda368996d26746c56f87b

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              bd3d8797ea648fc59cc524745a69eff1

                                                                              SHA1

                                                                              788db974000c5703cddd14a8248c6aa16a9e9788

                                                                              SHA256

                                                                              424dff0847b1b9ad40f016edf26e9abe5cb97b1891e1dc52fd3603a24f94d96a

                                                                              SHA512

                                                                              9f66ba9648b18ed00cb8b8047c4e2229fabad4e3f9cbe2aea4ef6c1f1125926cdb5d7de3ce4b9f6e8306645b5638d1748ca40e5042d4aa697b107aa82738ddd5

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              6b97f61f55a7b81c3d22d30919b8cbb0

                                                                              SHA1

                                                                              f4f81b422901431e1cfd7450d998e234fd467671

                                                                              SHA256

                                                                              ead881c0d0a7e4055729a19760844c42488e323828e81ed407e2580bcea09744

                                                                              SHA512

                                                                              78bdc4ae5c69a6c6422c71b0967d2d377fc4eee64d75fc40db0c84ca9d9d734d5c3965d10714a86257b6d39e3ce9607567e2d6c0265f0640f39b494c620e2e62

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              01038fddf5616559255d69ac1b8f7a3f

                                                                              SHA1

                                                                              26edc9790bf0f65165c40c7f44588439f0b44972

                                                                              SHA256

                                                                              c43c48e2300ee3994e83ca99396126da99599a31f80e7d1343a2692046d69a6e

                                                                              SHA512

                                                                              7cfcc58299f49afe3d75fc64e0fa85b4e44434d9fd21ac7fd664c47117bef12cd41efe23f89df1b8bea8fc5a817dfb09b848783a2e8e3aa5538e1bb661ab57da

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57c515.TMP

                                                                              Filesize

                                                                              1KB

                                                                              MD5

                                                                              4e71c6a338e7a2fec422120cae10c4a6

                                                                              SHA1

                                                                              11666d0d0859337e84f3763001dca15585bc6fca

                                                                              SHA256

                                                                              1fb9100406bb274f8d3a1ba5e2328cdcebeca276ab9e4706df0adcbd181a8518

                                                                              SHA512

                                                                              194922495290318bf154699cdcb8307f30dd93d922ddca520c3ef70ef1adc075982a275f10ade8f7163c492f4fa65f2f3b2416d047c9f1c9175ec1b31a174c69

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                              Filesize

                                                                              16B

                                                                              MD5

                                                                              6752a1d65b201c13b62ea44016eb221f

                                                                              SHA1

                                                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                              SHA256

                                                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                              SHA512

                                                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                              Filesize

                                                                              12KB

                                                                              MD5

                                                                              e0f053205e6c266c1ac21407acb626ac

                                                                              SHA1

                                                                              c8aed02076de81fa2a3ad8b7d48aaaa0b6442a11

                                                                              SHA256

                                                                              aa99e9e45644040e2bf36a53fd4802994889a04f111d2007fff65bd929aaee2c

                                                                              SHA512

                                                                              f52d6acef0366dc3a3ac5e91b99d196f5fdbbd476d7161e5867ee97b6947007cafec555286191c64584ead469681be20d3f333eda5ab5a452bfed18d6882226d

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                              Filesize

                                                                              11KB

                                                                              MD5

                                                                              876623756c0aab7c890f663fef262768

                                                                              SHA1

                                                                              c6363e3f6e5fd3706dfd57456cb56c9847908467

                                                                              SHA256

                                                                              0edebe2f871b58d5fda24391dbd154e84e7c82074dbeb6ca86465b281caa121c

                                                                              SHA512

                                                                              69713e58a0465bfb6fe5c2032a98d000df8b4e569b8d1564f51051326d606df8c99fb1911060aad5bdfede01db53e3ecb5412530a8cbf8de5110590cdc86ffed

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                                                                              Filesize

                                                                              896KB

                                                                              MD5

                                                                              c577a44eebcc39c126bf5e167727e951

                                                                              SHA1

                                                                              78a17464f66089930b707ba7a59dc0074f473e69

                                                                              SHA256

                                                                              cafc0b2ebc3c462e93f0bae0446b9c1f4fc801879afb3003e247f7c9aca081c0

                                                                              SHA512

                                                                              223d16dd064d25a70e6796512f9e7fb5e6a0d4c967feffe6028487880c2cfa2f3eba43032152965483b21bc2089d5b934da5e8366745cdde957cb7e21dbbbf3b

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbres

                                                                              Filesize

                                                                              4KB

                                                                              MD5

                                                                              b6814e252a56fc571fb352b9d820ee8d

                                                                              SHA1

                                                                              ae06a561ff2d3f60c2019c6dd39b5808af5bb501

                                                                              SHA256

                                                                              765af5585d4da3daa874cd40508da945f993befc166e3458365818273ed6fe80

                                                                              SHA512

                                                                              29a8c08ed6f899deba2a61a8e09a463bcceccb27f90bbd783bdbf8cb306e4c99df7deef58a438689b7fe92dcdefd6842f2decf37c814ce611ca8b2666489c45c

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

                                                                              Filesize

                                                                              498B

                                                                              MD5

                                                                              90be2701c8112bebc6bd58a7de19846e

                                                                              SHA1

                                                                              a95be407036982392e2e684fb9ff6602ecad6f1e

                                                                              SHA256

                                                                              644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

                                                                              SHA512

                                                                              d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

                                                                              Filesize

                                                                              9KB

                                                                              MD5

                                                                              5433eab10c6b5c6d55b7cbd302426a39

                                                                              SHA1

                                                                              c5b1604b3350dab290d081eecd5389a895c58de5

                                                                              SHA256

                                                                              23dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131

                                                                              SHA512

                                                                              207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34

                                                                            • C:\Users\Admin\AppData\Local\Temp\27AF.tmp\AgileDotNet.VMRuntime.dll

                                                                              Filesize

                                                                              49KB

                                                                              MD5

                                                                              266373fadd81120baeae3504e1654a5a

                                                                              SHA1

                                                                              1a66e205c7b0ba5cd235f35c0f2ea5f52fdea249

                                                                              SHA256

                                                                              0798779dc944ba73c5a9ce4b8781d79f5dd7b5f49e4e8ef75020de665bad8ccb

                                                                              SHA512

                                                                              12da48e8770dc511685fb5d843f73ef6b7e6747af021f4ba87494bba0ec341a6d7d3704f2501e2ad26822675e83fd2877467342aacdb2fd718e526dafd10506b

                                                                            • C:\Users\Admin\AppData\Local\Temp\5a530dfd-bc51-4992-a05d-f09d41a331d4\AgileDotNetRT64.dll

                                                                              Filesize

                                                                              75KB

                                                                              MD5

                                                                              42b2c266e49a3acd346b91e3b0e638c0

                                                                              SHA1

                                                                              2bc52134f03fcc51cb4e0f6c7cf70646b4df7dd1

                                                                              SHA256

                                                                              adeed015f06efa363d504a18acb671b1db4b20b23664a55c9bc28aef3283ca29

                                                                              SHA512

                                                                              770822fd681a1d98afe03f6fbe5f116321b54c8e2989fb07491811fd29fca5b666f1adf4c6900823af1271e342cacc9293e9db307c4eef852d1a253b00347a81

                                                                            • C:\Users\Admin\AppData\Local\Temp\7429.tmp\742A.vbs

                                                                              Filesize

                                                                              2KB

                                                                              MD5

                                                                              fd76266c8088a4dca45414c36c7e9523

                                                                              SHA1

                                                                              6b19bf2904a0e3b479032e101476b49ed3ae144a

                                                                              SHA256

                                                                              f853dddb0f9f1b74b72bccdb5191c28e18d466b5dbc205f7741a24391375cd6f

                                                                              SHA512

                                                                              3cd49395368e279ac9a63315583d3804aa89ec8bb6112754973451a7ea7b68140598699b30eef1b0e94c3286d1e6254e2063188282f7e6a18f1349877adeb072

                                                                            • C:\Users\Admin\AppData\Local\Temp\7429.tmp\MicrosoftWindowsServicesEtc\AppKill.bat

                                                                              Filesize

                                                                              671B

                                                                              MD5

                                                                              d4e987817d2e5d6ed2c12633d6f11101

                                                                              SHA1

                                                                              3f38430a028f9e3cb66c152e302b3586512dd9c4

                                                                              SHA256

                                                                              5549670ef8837c6e3c4e496c1ea2063670618249d4151dea4d07d48ab456690c

                                                                              SHA512

                                                                              b84fef88f0128b46f1e2f9c5dff2cb620ee885bed6c90dcf4a5dc51c77bea492c92b8084d8dc8b4277b47b2493a2d9d3f348c6e229bf3da9041ef90e0fd8b6c4

                                                                            • C:\Users\Admin\AppData\Local\Temp\7429.tmp\MicrosoftWindowsServicesEtc\CallFunc.vbs

                                                                              Filesize

                                                                              388B

                                                                              MD5

                                                                              5f9737f03289963a6d7a71efab0813c4

                                                                              SHA1

                                                                              ba22dfae8d365cbf8014a630f23f1d8574b5cf85

                                                                              SHA256

                                                                              a767894a68ebc490cb5ab2b7b04dd12b7465553ce7ba7e41e1ea45f1eaef5275

                                                                              SHA512

                                                                              5f4fb691e6da90e8e0872378a7b78cbd1acbf2bd75d19d65f17bf5b1cea95047d66b79fd1173703fcfef42cfc116ca629b9b37e355e44155e8f3b98f2d916a2a

                                                                            • C:\Users\Admin\AppData\Local\Temp\7429.tmp\MicrosoftWindowsServicesEtc\DgzRun.vbs

                                                                              Filesize

                                                                              341B

                                                                              MD5

                                                                              a91417f7c55510155771f1f644dd6c7e

                                                                              SHA1

                                                                              41bdb69c5baca73f49231d5b5f77975b79e55bdf

                                                                              SHA256

                                                                              729f7540887cf32a5d4e1968a284c46cf904752821c734bd970ecd30a848477a

                                                                              SHA512

                                                                              f786699c1ab9d7c74dd9eb9d76a76728980b29e84999a166a47b7ee102d8e545901ed0fcb30331712490a36de2d726115b661ad3900cdc2bfcfc601d00b76b07

                                                                            • C:\Users\Admin\AppData\Local\Temp\7429.tmp\MicrosoftWindowsServicesEtc\breakrule.exe

                                                                              Filesize

                                                                              58KB

                                                                              MD5

                                                                              bcb0ac4822de8aeb86ea8a83cd74d7ca

                                                                              SHA1

                                                                              8e2b702450f91dde3c085d902c09dd265368112e

                                                                              SHA256

                                                                              5eafebd52fbf6d0e8abd0cc9bf42d36e5b6e4d85b8ebe59f61c9f2d6dccc65e4

                                                                              SHA512

                                                                              b73647a59eeb92f95c4d7519432ce40ce9014b292b9eb1ed6a809cca30864527c2c827fe49c285bb69984f33469704424edca526f9dff05a6244b33424df01d1

                                                                            • C:\Users\Admin\AppData\Local\Temp\7429.tmp\MicrosoftWindowsServicesEtc\bsod.exe

                                                                              Filesize

                                                                              1.2MB

                                                                              MD5

                                                                              8f6a3b2b1af3a4aacd8df1734d250cfe

                                                                              SHA1

                                                                              505b3bd8e936cb5d8999c1b319951ffebab335c9

                                                                              SHA256

                                                                              6581eeab9fd116662b4ca73f6ef00fb96e0505d01cfb446ee4b32bbdeefe1361

                                                                              SHA512

                                                                              c1b5f845c005a1a586080e9da9744e30c7f3eda1e3aaba9c351768f7dea802e9f39d0227772413756ab63914ae4a2514e6ce52c494a91e92c3a1f08badb40264

                                                                            • C:\Users\Admin\AppData\Local\Temp\7429.tmp\MicrosoftWindowsServicesEtc\checker.bat

                                                                              Filesize

                                                                              151B

                                                                              MD5

                                                                              f59801d5c49713770bdb2f14eff34e2f

                                                                              SHA1

                                                                              91090652460c3a197cfad74d2d3c16947d023d63

                                                                              SHA256

                                                                              3382484b5a6a04d05500e7622da37c1ffaef3a1343395942bc7802bf2a19b53f

                                                                              SHA512

                                                                              c1c3a78f86e7938afbe391f0e03065b04375207704e419fe77bf0810d1e740c3ef8926c878884ad81b429ec41e126813a68844f600e124f5fa8d28ef17b4b7bc

                                                                            • C:\Users\Admin\AppData\Local\Temp\7429.tmp\MicrosoftWindowsServicesEtc\clingclang.wav

                                                                              Filesize

                                                                              13.1MB

                                                                              MD5

                                                                              1c723b3b9420e04cb8845af8b62a37fa

                                                                              SHA1

                                                                              3331a0f04c851194405eb9a9ff49c76bfa3d4db0

                                                                              SHA256

                                                                              6831f471ee3363e981e6a1eb0d722f092b33c9b73c91f9f2a9aafa5cb4c56b29

                                                                              SHA512

                                                                              41f4005ec2a7e0ee8e0e5f52b9d97f25a64a25bb0f00c85c07c643e4e63ea361b4d86733a0cf719b30ea6af225c4fcaca494f22e8e2f73cda9db906c5a0f12ae

                                                                            • C:\Users\Admin\AppData\Local\Temp\7429.tmp\MicrosoftWindowsServicesEtc\data\eula32.exe

                                                                              Filesize

                                                                              1.2MB

                                                                              MD5

                                                                              cbc127fb8db087485068044b966c76e8

                                                                              SHA1

                                                                              d02451bd20b77664ce27d39313e218ab9a9fdbf9

                                                                              SHA256

                                                                              c5704419b3eec34fb133cf2509d12492febdcb8831efa1ab014edeac83f538d9

                                                                              SHA512

                                                                              200ee39287f056b504cc23beb1b301a88b183a3806b023d936a2d44a31bbfd08854f6776082d4f7e2232c3d2f606cd5d8229591ecdc86a2bbcfd970a1ee33d41

                                                                            • C:\Users\Admin\AppData\Local\Temp\7429.tmp\MicrosoftWindowsServicesEtc\data\excursor.ani

                                                                              Filesize

                                                                              17KB

                                                                              MD5

                                                                              289624a46bb7ec6d91d5b099343b7f24

                                                                              SHA1

                                                                              2b0aab828ddb252baf4ed99994f716d136cd7948

                                                                              SHA256

                                                                              b93b0cb2bb965f5758cb0c699fbc827a64712d6f248aaf810cde5fa5ef3227eb

                                                                              SHA512

                                                                              8c77696fe1c897f56ea3afdecf67ad1128274815942cd4c73d30bf0a44dd1a690d8c2f4b0be08e604853084e5515020c2e913d6e044f9801b6223c1912eec8f8

                                                                            • C:\Users\Admin\AppData\Local\Temp\7429.tmp\MicrosoftWindowsServicesEtc\data\fileico.ico

                                                                              Filesize

                                                                              38KB

                                                                              MD5

                                                                              a62eeca905717738a4355dc5009d0fc6

                                                                              SHA1

                                                                              dd4cc0d3f203d395dfdc26834fc890e181d33382

                                                                              SHA256

                                                                              d13f7fd44f38136dae1cdf147ba9b673e698f77c0a644ccd3c12e3a71818a0cd

                                                                              SHA512

                                                                              47ffac6dc37dac4276579cd668fd2524ab1591b594032adbeb609d442f3a28235a2d185c66d8b78b6827ac51d62d97bdc3dffc3ffbaa70cf13d4d5f1dc5f16c2

                                                                            • C:\Users\Admin\AppData\Local\Temp\7429.tmp\MicrosoftWindowsServicesEtc\data\runner32s.exe

                                                                              Filesize

                                                                              58KB

                                                                              MD5

                                                                              87815289b110cf33af8af1decf9ff2e9

                                                                              SHA1

                                                                              09024f9ec9464f56b7e6c61bdd31d7044bdf4795

                                                                              SHA256

                                                                              a97ea879e2b51972aa0ba46a19ad4363d876ac035502a2ed2df27db522bc6ac4

                                                                              SHA512

                                                                              8d9024507fa83f578b375c86f38970177313ec3dd9fae794b6e7f739e84fa047a9ef56bf190f6f131d0c7c5e280e729208848b152b3ca492a54af2b18e70f5dc

                                                                            • C:\Users\Admin\AppData\Local\Temp\7429.tmp\MicrosoftWindowsServicesEtc\data\thetruth.jpg

                                                                              Filesize

                                                                              483KB

                                                                              MD5

                                                                              7907845316bdbd32200b82944d752d9c

                                                                              SHA1

                                                                              1e5c37db25964c5dd05f4dce392533a838a722a9

                                                                              SHA256

                                                                              4e3baea3d98c479951f9ea02e588a3b98b1975055c1dfdf67af4de6e7b41e476

                                                                              SHA512

                                                                              72a64fab025928d60174d067990c35caa3bb6dadacf9c66e5629ee466016bc8495e71bed218e502f6bde61623e0819485459f25f3f82836e632a52727335c0a0

                                                                            • C:\Users\Admin\AppData\Local\Temp\7zO05CF122D\MrsMajor2.0.exe

                                                                              Filesize

                                                                              25.6MB

                                                                              MD5

                                                                              247a35851fdee53a1696715d67bd0905

                                                                              SHA1

                                                                              d2e86020e1d48e527e81e550f06c651328bd58a4

                                                                              SHA256

                                                                              5dd4ea169cabf9226f54bb53e63ea6a1b5880a0d1222242aee378efb6255b57d

                                                                              SHA512

                                                                              a173801aaef4fab608d99b52223b5b2400d69b91edcbf33c21fcb47bd832eef9d771dfd36da350a502a371ed1739c869a7c2b4dca456c93f2feed9ac9c647c7c

                                                                            • C:\Users\Admin\AppData\Local\Temp\E70C.tmp\E70D.tmp\E70E.vbs

                                                                              Filesize

                                                                              352B

                                                                              MD5

                                                                              3b8696ecbb737aad2a763c4eaf62c247

                                                                              SHA1

                                                                              4a2d7a2d61d3f4c414b4e5d2933cd404b8f126e5

                                                                              SHA256

                                                                              ce95f7eea8b303bc23cfd6e41748ad4e7b5e0f0f1d3bdf390eadb1e354915569

                                                                              SHA512

                                                                              713d9697b892b9dd892537e8a01eab8d0265ebf64867c8beecf7a744321257c2a5c11d4de18fcb486bb69f199422ce3cab8b6afdbe880481c47b06ba8f335beb

                                                                            • C:\Users\Admin\AppData\Local\Temp\E70C.tmp\eulascr.exe

                                                                              Filesize

                                                                              143KB

                                                                              MD5

                                                                              8b1c352450e480d9320fce5e6f2c8713

                                                                              SHA1

                                                                              d6bd88bf33de7c5d4e68b233c37cc1540c97bd3a

                                                                              SHA256

                                                                              2c343174231b55e463ca044d19d47bd5842793c15954583eb340bfd95628516e

                                                                              SHA512

                                                                              2d8e43b1021da08ed1bf5aff110159e6bc10478102c024371302ccfce595e77fd76794658617b5b52f9a50190db250c1ba486d247d9cd69e4732a768edbb4cbc

                                                                            • C:\Users\Admin\AppData\Local\Temp\xRun.vbs

                                                                              Filesize

                                                                              93B

                                                                              MD5

                                                                              26ec8d73e3f6c1e196cc6e3713b9a89f

                                                                              SHA1

                                                                              cb2266f3ecfef4d59bd12d7f117c2327eb9c55fa

                                                                              SHA256

                                                                              ed588fa361979f7f9c6dbb4e6a1ae6e075f2db8d79ea6ca2007ba8e3423671b0

                                                                              SHA512

                                                                              2b3ad279f1cdc2a5b05073116c71d79e190bfa407da09d8268d56ac2a0c4cc0c31161a251686ac67468d0ba329c302a301c542c22744d9e3a3f5e7ffd2b51195

                                                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                                              Filesize

                                                                              10KB

                                                                              MD5

                                                                              65c0ad1ffc35c5ec5fb328984e1657c4

                                                                              SHA1

                                                                              ebad4d752d49a69925b52b2cc9d4f764e82729db

                                                                              SHA256

                                                                              62314b845b14500b7e02aeb277a2ded391c887065c32b918079cf5e02294de48

                                                                              SHA512

                                                                              74f7370dbdf1d5747ecfefa21fb1f6564107634956671273d8ec310243816a612f33b9b01088a1be9b1a2dec4b7861f3d7c2a8ca3efbba75aa5a48899d3aae0f

                                                                            • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\chilledwindows.mp4

                                                                              Filesize

                                                                              3.6MB

                                                                              MD5

                                                                              698ddcaec1edcf1245807627884edf9c

                                                                              SHA1

                                                                              c7fcbeaa2aadffaf807c096c51fb14c47003ac20

                                                                              SHA256

                                                                              cde975f975d21edb2e5faa505205ab8a2c5a565ba1ff8585d1f0e372b2a1d78b

                                                                              SHA512

                                                                              a2c326f0c653edcd613a3cefc8d82006e843e69afc787c870aa1b9686a20d79e5ab4e9e60b04d1970f07d88318588c1305117810e73ac620afd1fb6511394155

                                                                            • \??\pipe\LOCAL\crashpad_2096_VBCWZIAAJAQAUQFL

                                                                              MD5

                                                                              d41d8cd98f00b204e9800998ecf8427e

                                                                              SHA1

                                                                              da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                              SHA256

                                                                              e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                              SHA512

                                                                              cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                            • memory/924-792-0x00007FFA28750000-0x00007FFA29211000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/924-718-0x00007FFA28750000-0x00007FFA29211000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/924-796-0x00007FFA28750000-0x00007FFA29211000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/924-735-0x0000000002E80000-0x0000000002E90000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/924-743-0x0000000002E80000-0x0000000002E90000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/924-721-0x0000000002E80000-0x0000000002E90000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/924-717-0x00000000006B0000-0x0000000000B14000-memory.dmp

                                                                              Filesize

                                                                              4.4MB

                                                                            • memory/1276-716-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                              Filesize

                                                                              136KB

                                                                            • memory/1692-968-0x00007FFA28C90000-0x00007FFA29751000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/1692-941-0x00007FFA28C90000-0x00007FFA29751000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/1692-946-0x0000000002850000-0x0000000002860000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/1828-1126-0x0000000000380000-0x00000000004BC000-memory.dmp

                                                                              Filesize

                                                                              1.2MB

                                                                            • memory/1828-1128-0x0000000004D90000-0x0000000004E22000-memory.dmp

                                                                              Filesize

                                                                              584KB

                                                                            • memory/1828-1125-0x0000000072F60000-0x0000000073710000-memory.dmp

                                                                              Filesize

                                                                              7.7MB

                                                                            • memory/1828-1130-0x0000000004D20000-0x0000000004D2A000-memory.dmp

                                                                              Filesize

                                                                              40KB

                                                                            • memory/1828-1127-0x0000000005340000-0x00000000058E4000-memory.dmp

                                                                              Filesize

                                                                              5.6MB

                                                                            • memory/1828-1135-0x0000000004F40000-0x0000000004F50000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/1828-1131-0x0000000004F40000-0x0000000004F50000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/2460-960-0x00007FFA28C90000-0x00007FFA29751000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/2460-928-0x000000001E360000-0x000000001E888000-memory.dmp

                                                                              Filesize

                                                                              5.2MB

                                                                            • memory/2460-927-0x000000001DC60000-0x000000001DE22000-memory.dmp

                                                                              Filesize

                                                                              1.8MB

                                                                            • memory/2460-926-0x000000001BB80000-0x000000001BB90000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/2460-964-0x000000001BB80000-0x000000001BB90000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/2460-925-0x000000001BB80000-0x000000001BB90000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/2460-917-0x0000000000EE0000-0x0000000000F0A000-memory.dmp

                                                                              Filesize

                                                                              168KB

                                                                            • memory/2460-916-0x00007FFA28C90000-0x00007FFA29751000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/2460-970-0x000000001BB80000-0x000000001BB90000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/2872-873-0x00000000005F0000-0x00000000005F1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2872-882-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                              Filesize

                                                                              400KB

                                                                            • memory/2872-878-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                              Filesize

                                                                              400KB

                                                                            • memory/3100-713-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                              Filesize

                                                                              136KB

                                                                            • memory/3184-815-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/3184-808-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/3184-855-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/3184-854-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/3184-852-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/3184-851-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/3184-850-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/3184-824-0x00007FFA07D40000-0x00007FFA07D50000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/3184-823-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/3184-822-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/3184-821-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/3184-820-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/3184-799-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/3184-800-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/3184-819-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/3184-801-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/3184-818-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/3184-804-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/3184-817-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/3184-816-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/3184-813-0x00007FFA07D40000-0x00007FFA07D50000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/3184-814-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/3184-812-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/3184-811-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/3184-810-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/3184-856-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/3184-807-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/3184-802-0x00007FFA49DB0000-0x00007FFA49FA5000-memory.dmp

                                                                              Filesize

                                                                              2.0MB

                                                                            • memory/3184-803-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/3184-806-0x00007FFA09E30000-0x00007FFA09E40000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/3880-714-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                              Filesize

                                                                              136KB

                                                                            • memory/4088-966-0x00007FFA28C90000-0x00007FFA29751000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/4088-961-0x000000001B460000-0x000000001B470000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/4088-959-0x000000001B460000-0x000000001B470000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/4088-955-0x00007FFA28C90000-0x00007FFA29751000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/4500-769-0x000000001BC80000-0x000000001BDEA000-memory.dmp

                                                                              Filesize

                                                                              1.4MB

                                                                            • memory/4500-722-0x00000000025E0000-0x00000000025F0000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/4500-739-0x00000000213D0000-0x0000000021408000-memory.dmp

                                                                              Filesize

                                                                              224KB

                                                                            • memory/4500-738-0x00000000025E0000-0x00000000025F0000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/4500-737-0x00000000025E0000-0x00000000025F0000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/4500-736-0x0000000020F20000-0x0000000020F28000-memory.dmp

                                                                              Filesize

                                                                              32KB

                                                                            • memory/4500-725-0x00000000025E0000-0x00000000025F0000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/4500-740-0x00000000213A0000-0x00000000213AE000-memory.dmp

                                                                              Filesize

                                                                              56KB

                                                                            • memory/4500-720-0x00000000025E0000-0x00000000025F0000-memory.dmp

                                                                              Filesize

                                                                              64KB

                                                                            • memory/4500-719-0x00007FFA28750000-0x00007FFA29211000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/4500-786-0x00007FFA28750000-0x00007FFA29211000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/5076-869-0x0000000000400000-0x00000000006BC000-memory.dmp

                                                                              Filesize

                                                                              2.7MB

                                                                            • memory/5076-865-0x0000000000C10000-0x0000000000C11000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/5076-863-0x0000000000400000-0x00000000006BC000-memory.dmp

                                                                              Filesize

                                                                              2.7MB

                                                                            • memory/5076-888-0x0000000000C10000-0x0000000000C11000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/5076-864-0x0000000000400000-0x00000000006BC000-memory.dmp

                                                                              Filesize

                                                                              2.7MB