Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2024 12:55

General

  • Target

    https://github.com/TiaraAzzahra01/Wave-executor/releases/download/Download/setup.zip

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 20 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 26 IoCs
  • Loads dropped DLL 43 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Checks system information in the registry 2 TTPs 12 IoCs

    System information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • GoLang User-Agent 2 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies registry class 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2636
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        PID:5608
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/TiaraAzzahra01/Wave-executor/releases/download/Download/setup.zip
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1808
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfc5946f8,0x7ffcfc594708,0x7ffcfc594718
        2⤵
          PID:2728
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,487834587151510729,2851977909134892389,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:2
          2⤵
            PID:4420
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,487834587151510729,2851977909134892389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4676
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,487834587151510729,2851977909134892389,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2528 /prefetch:8
            2⤵
              PID:2344
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,487834587151510729,2851977909134892389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
              2⤵
                PID:3160
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,487834587151510729,2851977909134892389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1
                2⤵
                  PID:3184
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,487834587151510729,2851977909134892389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:8
                  2⤵
                    PID:2664
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,487834587151510729,2851977909134892389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2040
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,487834587151510729,2851977909134892389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:1
                    2⤵
                      PID:2388
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,487834587151510729,2851977909134892389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:1
                      2⤵
                        PID:220
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2132,487834587151510729,2851977909134892389,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4016 /prefetch:8
                        2⤵
                          PID:2768
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,487834587151510729,2851977909134892389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:1
                          2⤵
                            PID:4664
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2132,487834587151510729,2851977909134892389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6024 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4892
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,487834587151510729,2851977909134892389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:1
                            2⤵
                              PID:5096
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,487834587151510729,2851977909134892389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6240 /prefetch:1
                              2⤵
                                PID:2508
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,487834587151510729,2851977909134892389,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5140
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4964
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3212
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:8
                                  • C:\Windows\system32\OpenWith.exe
                                    C:\Windows\system32\OpenWith.exe -Embedding
                                    1⤵
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2848
                                  • C:\Users\Admin\Downloads\setup\setup\myproject.exe
                                    "C:\Users\Admin\Downloads\setup\setup\myproject.exe"
                                    1⤵
                                    • Loads dropped DLL
                                    • Maps connected drives based on registry
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4968
                                    • C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe
                                      C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • Drops file in Program Files directory
                                      • System Location Discovery: System Language Discovery
                                      PID:1920
                                      • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\MicrosoftEdgeUpdate.exe
                                        "C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\MicrosoftEdgeUpdate.exe" /installsource taggedmi /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"
                                        3⤵
                                        • Event Triggered Execution: Image File Execution Options Injection
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Checks system information in the registry
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3636
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          • Modifies registry class
                                          PID:5340
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          • Modifies registry class
                                          PID:5372
                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.19\MicrosoftEdgeUpdateComRegisterShell64.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.19\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                            5⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Modifies registry class
                                            PID:5392
                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.19\MicrosoftEdgeUpdateComRegisterShell64.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.19\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                            5⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Modifies registry class
                                            PID:5432
                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.19\MicrosoftEdgeUpdateComRegisterShell64.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.19\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                            5⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Modifies registry class
                                            PID:5472
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtyNDUydDErazJUZ3EvSFh6anZGTkJSaG9wQldSOXNialh4cWVVREg5dVgwPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTQ3LjM3IiBuZXh0dmVyc2lvbj0iMS4zLjE5NS4xOSIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNTE5OTc3NTM0MiIgaW5zdGFsbF90aW1lX21zPSI2NTYiLz48L2FwcD48L3JlcXVlc3Q-
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Checks system information in the registry
                                          • System Location Discovery: System Language Discovery
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          PID:5508
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource taggedmi /sessionid "{5F5C482E-AF00-40D9-8012-7FD88D46BD3F}"
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          PID:5564
                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=myproject.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=4968.1788.12275532551871854129
                                      2⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Checks system information in the registry
                                      • Enumerates system info in registry
                                      • Modifies data under HKEY_USERS
                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                      • System policy modification
                                      PID:2004
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=128.0.6613.120 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=128.0.2739.67 --initial-client-data=0x178,0x17c,0x180,0x154,0x188,0x7ffce7bb9fd8,0x7ffce7bb9fe4,0x7ffce7bb9ff0
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:4460
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView" --webview-exe-name=myproject.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1892,i,1776647704259769,15385826369118605236,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1840 /prefetch:2
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:5024
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView" --webview-exe-name=myproject.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2064,i,1776647704259769,15385826369118605236,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2092 /prefetch:3
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:392
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView" --webview-exe-name=myproject.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2392,i,1776647704259769,15385826369118605236,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2360 /prefetch:8
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:3296
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView" --webview-exe-name=myproject.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3544,i,1776647704259769,15385826369118605236,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3556 /prefetch:1
                                        3⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:5316
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView" --webview-exe-name=myproject.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=4676,i,1776647704259769,15385826369118605236,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4704 /prefetch:1
                                        3⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:756
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Downloads\setup\setup\myproject.exe\""
                                      2⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5520
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\Downloads\setup\setup\myproject.exe
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:6112
                                    • C:\Windows\System32\Wbem\wmic.exe
                                      wmic path win32_VideoController get name
                                      2⤵
                                      • Detects videocard installed
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3848
                                    • C:\Windows\system32\tasklist.exe
                                      tasklist
                                      2⤵
                                      • Enumerates processes with tasklist
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4256
                                    • C:\Windows\System32\Wbem\wmic.exe
                                      wmic csproduct get uuid
                                      2⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5128
                                    • C:\ProgramData\driver1.exe
                                      C:\ProgramData\driver1.exe
                                      2⤵
                                      • Executes dropped EXE
                                      PID:6140
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:1772
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Windows'"
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:6016
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Program Files'"
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:5160
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Program Files (x86)'"
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:3224
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Recovery'"
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:6120
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Imbasers'"
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:5604
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath '%USERPROFILE%\Desktop'"
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:3852
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\ProgramData'"
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:5640
                                      • C:\Imbasers\timbers.exe
                                        C:\Imbasers\timbers.exe
                                        3⤵
                                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:2400
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks /create /tn WinDriver /tr C:\ProgramData\Microsoft\WinDriver.exe /sc onstart /ru SYSTEM
                                      2⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:5160
                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
                                    1⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Checks system information in the registry
                                    • System Location Discovery: System Language Discovery
                                    • Modifies data under HKEY_USERS
                                    PID:5632
                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzNSIgaW5zdGFsbGRhdGV0aW1lPSIxNzIyNjAyNzMzIiBvb2JlX2luc3RhbGxfdGltZT0iMTMzNjcwNzUyNzY2Nzc2NzYwIj48ZXZlbnQgZXZlbnR0eXBlPSIzMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMjExNDMyNSIgc3lzdGVtX3VwdGltZV90aWNrcz0iNTIwNDUwMjM3NSIvPjwvYXBwPjwvcmVxdWVzdD4
                                      2⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Checks system information in the registry
                                      • System Location Discovery: System Language Discovery
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      PID:5692
                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B6AF2DEA-BC41-4FAB-AD18-A0284CE17980}\MicrosoftEdge_X64_128.0.2739.67.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B6AF2DEA-BC41-4FAB-AD18-A0284CE17980}\MicrosoftEdge_X64_128.0.2739.67.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
                                      2⤵
                                      • Executes dropped EXE
                                      PID:6088
                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B6AF2DEA-BC41-4FAB-AD18-A0284CE17980}\EDGEMITMP_6FC7B.tmp\setup.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B6AF2DEA-BC41-4FAB-AD18-A0284CE17980}\EDGEMITMP_6FC7B.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B6AF2DEA-BC41-4FAB-AD18-A0284CE17980}\MicrosoftEdge_X64_128.0.2739.67.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
                                        3⤵
                                        • Executes dropped EXE
                                        • Drops file in Program Files directory
                                        PID:532
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B6AF2DEA-BC41-4FAB-AD18-A0284CE17980}\EDGEMITMP_6FC7B.tmp\setup.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B6AF2DEA-BC41-4FAB-AD18-A0284CE17980}\EDGEMITMP_6FC7B.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=128.0.6613.120 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B6AF2DEA-BC41-4FAB-AD18-A0284CE17980}\EDGEMITMP_6FC7B.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=128.0.2739.67 --initial-client-data=0x22c,0x230,0x234,0x208,0x238,0x7ff605c016d8,0x7ff605c016e4,0x7ff605c016f0
                                          4⤵
                                          • Executes dropped EXE
                                          PID:5164
                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuMTkiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuMTkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NUY1QzQ4MkUtQUYwMC00MEQ5LTgwMTItN0ZEODhENDZCRDNGfSIgdXNlcmlkPSJ7ODI2NTkxRUMtREJGNS00NDQzLTg4QUItQkRGRkVCOTM3MTJFfSIgaW5zdGFsbHNvdXJjZT0idGFnZ2VkbWkiIHJlcXVlc3RpZD0iezIyNzVBMUQ4LTgyMzEtNEE4Mi1CNDcxLTE1RjA1ODIzNjQ3Qn0iIGRlZHVwPSJjciIgZG9tYWluam9pbmVkPSIwIj48aHcgbG9naWNhbF9jcHVzPSI4IiBwaHlzbWVtb3J5PSI4IiBkaXNrX3R5cGU9IjIiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGMzAxNzIyNi1GRTJBLTQyOTUtOEJERi0wMEMzQTlBN0U0QzV9IiB2ZXJzaW9uPSIiIG5leHR2ZXJzaW9uPSIxMjguMC4yNzM5LjY3IiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaW5zdGFsbGFnZT0iLTEiIGluc3RhbGxkYXRlPSItMSI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MjE4Mzk4NzY1IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzU3IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1OTU2MDg5MDUzIiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iOTIyIiBkb3dubG9hZF90aW1lX21zPSIyNjA2OSIgZG93bmxvYWRlZD0iMTczNzU2NTEyIiB0b3RhbD0iMTczNzU2NTEyIiBwYWNrYWdlX2NhY2hlX3Jlc3VsdD0iMCIgaW5zdGFsbF90aW1lX21zPSI0NjE5NyIvPjwvYXBwPjwvcmVxdWVzdD4
                                      2⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Checks system information in the registry
                                      • System Location Discovery: System Language Discovery
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      PID:792
                                  • C:\Windows\system32\NOTEPAD.EXE
                                    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\setup\setup\Read it to me.txt
                                    1⤵
                                      PID:5840
                                    • C:\Program Files\VideoLAN\VLC\vlc.exe
                                      "C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Downloads\PublishPing.m4a"
                                      1⤵
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      • Suspicious behavior: AddClipboardFormatListener
                                      • Suspicious behavior: GetForegroundWindowSpam
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      • Suspicious use of SetWindowsHookEx
                                      PID:4672
                                    • C:\Users\Admin\Downloads\setup\setup\myproject.exe
                                      "C:\Users\Admin\Downloads\setup\setup\myproject.exe"
                                      1⤵
                                      • Loads dropped DLL
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5432
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=myproject.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=5432.4052.1197366738982815318
                                        2⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:856
                                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=128.0.6613.120 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=128.0.2739.67 --initial-client-data=0x160,0x164,0x168,0x13c,0x174,0x7ffce7bb9fd8,0x7ffce7bb9fe4,0x7ffce7bb9ff0
                                          3⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          PID:1560
                                    • C:\Windows\system32\taskmgr.exe
                                      "C:\Windows\system32\taskmgr.exe" /7
                                      1⤵
                                      • Checks SCSI registry key(s)
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of FindShellTrayWindow
                                      • Suspicious use of SendNotifyMessage
                                      PID:2160

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Program Files (x86)\Microsoft\EdgeCore\128.0.2739.67\Installer\setup.exe

                                      Filesize

                                      6.6MB

                                      MD5

                                      16dd69461337762007690317e733734d

                                      SHA1

                                      235528177001b7b413ae7f1af448d9867b4045ae

                                      SHA256

                                      e3a007015a353cea188804336cec71c961c7dbd3c89cd588818114ba66c806e3

                                      SHA512

                                      ed60676bdda50480d655cb1cb7edcf7d25355b9d40ec3b3906995d53a9860b259c77974d6f12e49e01e95997cc8d7ffdb4b441f4dab1992de11ee269f262f701

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\EdgeUpdate.dat

                                      Filesize

                                      12KB

                                      MD5

                                      369bbc37cff290adb8963dc5e518b9b8

                                      SHA1

                                      de0ef569f7ef55032e4b18d3a03542cc2bbac191

                                      SHA256

                                      3d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3

                                      SHA512

                                      4f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\MicrosoftEdgeComRegisterShellARM64.exe

                                      Filesize

                                      182KB

                                      MD5

                                      3a6b04122205ec351f8fbef3e20f65c4

                                      SHA1

                                      ba2e989a1f1963652405b632f5020e972da76a8c

                                      SHA256

                                      7ba65317643fbc0d03195bdeeba318732823a91ef27f62483d5fc0ed3fea4912

                                      SHA512

                                      2a0dbc91e79c42bf934ce7ab41ff6ed900322706bb71ffa1f3ade4ad85e0e1de2fa31540e1f1e0e979ad749c84343563ebe341585965f2f3a62debd6b4ab0cb0

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\MicrosoftEdgeUpdate.exe

                                      Filesize

                                      201KB

                                      MD5

                                      b0d94ffd264b31a419e84a9b027d926b

                                      SHA1

                                      4c36217abe4aebe9844256bf6b0354bb2c1ba739

                                      SHA256

                                      f471d9ff608fe58da68a49af83a7fd9a3d6bf5a5757d340f7b8224b6cd8bddf6

                                      SHA512

                                      d68737f1d87b9aa410d13b494c1817d5391e8f098d1cdf7b672f57713b289268a2d1e532f2fc7fec44339444205affb996e32b23c3162e2a539984be05bb20c4

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\MicrosoftEdgeUpdateComRegisterShell64.exe

                                      Filesize

                                      215KB

                                      MD5

                                      1d35f02c24d817cd9ae2b9bd75a4c135

                                      SHA1

                                      8e9a8fe8ca927f2b40f751f2f2b1e206f1d0905f

                                      SHA256

                                      0abf4f0fe0033a56ebdaff875b63cc083fd9c8628d2fb2ab5826d3c0c687b262

                                      SHA512

                                      17d8582c96b22372a6e1a925ccc75531f9bab75ebe651a513774a02021801d38e8f49b4e9679a9dfc53ccc29193fed18ab2e2935b9b7423605e63501028240e9

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\MicrosoftEdgeUpdateCore.exe

                                      Filesize

                                      262KB

                                      MD5

                                      e468fe744cbaebc00b08578f6c71fbc0

                                      SHA1

                                      2ae65aadb9ab82d190bdcb080e00ff9414e3c933

                                      SHA256

                                      7c75c35f4222e83088de98ba25595eb76013450fc959d7feefcab592d1c9839f

                                      SHA512

                                      184a6f2378463c3ccc0f491f4a12d6cac38b10a916c8525a27acd91f681eb8fb0be956fc4bdb99e5a6c7b76f871069f939c996e93a68ff0a6c305195a6049276

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\NOTICE.TXT

                                      Filesize

                                      4KB

                                      MD5

                                      6dd5bf0743f2366a0bdd37e302783bcd

                                      SHA1

                                      e5ff6e044c40c02b1fc78304804fe1f993fed2e6

                                      SHA256

                                      91d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5

                                      SHA512

                                      f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdate.dll

                                      Filesize

                                      2.1MB

                                      MD5

                                      b0da0a3975239134c6454035e5c3ed79

                                      SHA1

                                      fbea5c89ef828564f3d3640d38b8a9662c5260e6

                                      SHA256

                                      c590d1af571d75d85cfe6cb3d1aa0808c702bcefd1b74b93ea423676859fb8ba

                                      SHA512

                                      5fbfa431a855d634bcbef4c54e5cc62b6435629305efee11559f66473c427ad0775c09364d37aaa7a4a8a963800886f6547a52ae680a1ff2c4dcc52c87d994bb

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_af.dll

                                      Filesize

                                      29KB

                                      MD5

                                      c54dfe1257b6b4e1c6b65dabf464c9fa

                                      SHA1

                                      aef273340160af0470321e36e9c89e1a858e9d39

                                      SHA256

                                      0c426d4d48efff328a0da5497af24e83892a2ed1d6397a6dc42f9548a24dbff5

                                      SHA512

                                      58ae24dfc6045ce1f8ed782a03cb3d02c10b99a2992b9326711fb8700c8e7d05cfbca21e9b47cb4b1f4f806a9bb7667672026c715aad2f175febb6ba2b5f95db

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_am.dll

                                      Filesize

                                      24KB

                                      MD5

                                      ccdf8ae84e25f2df4df2c9dd61b94461

                                      SHA1

                                      64cd90b95a17d9ecf2a44afc0d83730b263ba5fe

                                      SHA256

                                      816c64b37e4c42cd418d05bc34a64e9c4acb4ce08b2a18ac5484374ca7b76e76

                                      SHA512

                                      242a8a93326d3a5ea1fd367ef6cc2b343f08f4ff68d88d91044d0ad7fce490f47524a6e57940991ff0893a590459e96c588944f2b115cee703413ca594046f7f

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_ar.dll

                                      Filesize

                                      26KB

                                      MD5

                                      3374d9bc4467dbdeaf50bbd5a26edcfa

                                      SHA1

                                      6d7bd73ad27148bad7488959d7ebea22b6805436

                                      SHA256

                                      5c8a8755cc0b1213fb0d5b57e10a53702f2091479d3c058d0c756134e548c685

                                      SHA512

                                      c0c02e54d7e0060b6ffa5bedf8d79cf4b40f77711680d2161b5186c5a8a10e521169dfa7ab6b8e4816c98e4aefd136f209a40c78104cb618c21105e095537719

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_as.dll

                                      Filesize

                                      29KB

                                      MD5

                                      87e596d8f0ac9fbe2d3176665eeb68f3

                                      SHA1

                                      1c9364d55b4844cd250504abe30dcff9792ee576

                                      SHA256

                                      c39669e004facfb0c500788747a4427fe26dcdb50ae695562e6e417f4eb190cd

                                      SHA512

                                      ef3708632e19332ddf460e081f8444ff8b4ec483c6b3e57f386df66d5f62d222b1d3f9f3728928701a6e48720133133c43619858853585a7d70b7bd5d8cf847e

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_az.dll

                                      Filesize

                                      29KB

                                      MD5

                                      ace0925ded0a4507d82e6d32a77c50df

                                      SHA1

                                      c760ff52c71de3080631120c6992dcd0ac4e37bd

                                      SHA256

                                      8e3c517bfc5986310c35f30b9681d9c919a7d62e299014410132ddc2b41f00b3

                                      SHA512

                                      8adec80e179f205d0571625c1a63a0188e6533adefd48691f2fc287a546c12249c2126e6958d1732fa8847492a8287723a0196fbc0f2b9af3c54e1ab418cc3e6

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_bg.dll

                                      Filesize

                                      29KB

                                      MD5

                                      aeb3a05ce4eecdef3d23dbc0094fe21f

                                      SHA1

                                      e2a5c49b4d0fddcad28649bd09d0cc7af4c0b2c8

                                      SHA256

                                      6c874a312ae57b8b0deac8457a200fcfc90aceaaa252628701c92aa8b9a823e8

                                      SHA512

                                      4a7fe6cf8300b394d7471d9a2d759ebed59690ce925270d6ceaa4e14ee06f01b67f8219559e9ec917477f4c5aae03329ae2c6e231f3fd41c645d02d26b29f367

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_bn-IN.dll

                                      Filesize

                                      29KB

                                      MD5

                                      afa21b2feee2831c5478e113ed814b76

                                      SHA1

                                      9e883c990a31b8cd0ed2f80f732f404386cc55d9

                                      SHA256

                                      183bcae9e143b78d04c2ed83ab6cac8cbd82f1d2bcf7bbb2506886a3925ac556

                                      SHA512

                                      294838c67f6d87fc3b4975c73d24e1c38173c8ad4a14c215945e9910ddc306e9deb0168f38661c85b5c77929fcbf56093f632a35c1b39181203fbd662d71f7f8

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_bn.dll

                                      Filesize

                                      29KB

                                      MD5

                                      8e0ff856270ca13f8c07825e39ae3613

                                      SHA1

                                      b351f8ae0cc13d97d201a268990b75fc9e6cd422

                                      SHA256

                                      18cd8ed69df17e1bcb517285caa88c8a73e093984fecbea2587e7144a8812a73

                                      SHA512

                                      25f3821c20aa222a28143951c9f370d3feceaf41e449f718640dce9af0e88e518bc40d2d02f5e64148d8909feedcfa6a8caf65a87ad12637a8bc13c848b1f178

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_bs.dll

                                      Filesize

                                      29KB

                                      MD5

                                      9f4c9469ef1930ec3ca02ea3b305e963

                                      SHA1

                                      e588ffdf150b55bb4ba38e2aaf175aaf6e1826d0

                                      SHA256

                                      fef14de38a4501cf538c89ca2d1ec389031124f69df9090df94fb4461e54ad58

                                      SHA512

                                      c166189ad76cb395a2aeea724f2088f42dd4d361518856166fb92b3335b8fc670e99eb7b1c4c9ac2c872c8283826cc2c88009bd975e690efbcc3d99289557e96

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_ca-Es-VALENCIA.dll

                                      Filesize

                                      30KB

                                      MD5

                                      2e9132ee071ca5653baf90b9b1ea382e

                                      SHA1

                                      8a0c1e5a0df6432c50539d68caf697b8adaf1556

                                      SHA256

                                      adf6e6542f1422c431ef92a209886224fbb53b5c67e68ac070d5c8a4c6ee569a

                                      SHA512

                                      0b021758117109e4414c7ef37356106a96b68536ade8d3f1d1fb3dfce7c1132ab6fe02f7292ed225c09814a9c57124f731fd35069d220760678eab565f320976

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_ca.dll

                                      Filesize

                                      30KB

                                      MD5

                                      917c18cfa84c8b8e83d8321f03be093b

                                      SHA1

                                      c0a4a743f4059183724fc8c26e84b5a80bb2f7f0

                                      SHA256

                                      6c56355b232c3bd35f397f99648c020733ea2d57db1cd4beafffcd962b896ae4

                                      SHA512

                                      03359c6104e9f0cb2d66b6f1bf5598b2bb00d9e7a62fbd0c5475ca67b5194e96c2e6053a2a1c22323ba0002c614caab0477597fd34b57dd1f5acdb19f70c0854

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_cs.dll

                                      Filesize

                                      28KB

                                      MD5

                                      8b49a989a56d4a5aabd0a03f179ed92e

                                      SHA1

                                      ca2f84217c867eb853830e95c7717ce35bd997f9

                                      SHA256

                                      849e23c2f53d06462bd0f38e9d7c98e9389486f526a90c461c04c0aa1db7b7be

                                      SHA512

                                      f4861ab9200db234550cd2e355ce200b7746c614e9c326287c0509d152f29d41d7a056e4fd27e3150cb433cd0234c4ae1cbc0c3a8b5892ecb3e8d4632a985aa7

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_cy.dll

                                      Filesize

                                      28KB

                                      MD5

                                      1146f59b139b9d810996a1bae978f214

                                      SHA1

                                      cc9d54e6e3ce1efc4ef851eba35222547b996937

                                      SHA256

                                      7b5ce6c7fa03e69a93694fa59c61be88b3eb8cd8951790f3bdd7cba2d99e6b83

                                      SHA512

                                      0c94943646b0a08662eda2d236b7c88ecec0745faff5b9c6097f68e73a20059f8d2de47a9c00e58c6d2083331a34a0fa19b0964f3c62a6b8cfa02bc1e283e75a

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_da.dll

                                      Filesize

                                      29KB

                                      MD5

                                      08fb61cf492ccd1236907af7a6b1bd4b

                                      SHA1

                                      9f6e0f7610d42f8a402d3adb7b66374f4d0f3cb5

                                      SHA256

                                      d6261d4bd9ce4011caee1e0efefb5685a5bb5e29130ad8639e4578fc90027631

                                      SHA512

                                      747982680ebc9e3c0993a69923c94382df6bfc113ebb76d31f65f9d824abef1a051a4e351f0f42296fd84e7663fc3bcc784da51dbce0554c3a880ac2258aa16c

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_de.dll

                                      Filesize

                                      31KB

                                      MD5

                                      970e46bfaca8f697e490e8c98a6f4174

                                      SHA1

                                      2bc396e8f49324dee9eb8cc49cdb61f5313130d9

                                      SHA256

                                      eeff2c2487c6456e6a3ed43fe5fbb9d3b72e301d3e23867b5d64f5941eb36dcb

                                      SHA512

                                      789f29ee2c34d86da5c69225bb8b2fd96273c20146126c28d3d36a880bbda5b16ace479ce59aafdf645328255105133f489278023e63e04e9fa1fb34cc1f3ae1

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_el.dll

                                      Filesize

                                      31KB

                                      MD5

                                      3d22a75afd81e507e133fe2d97388f2e

                                      SHA1

                                      f7f68cb6867d8c6386438d5a6e26539be493505b

                                      SHA256

                                      823fe6edc1fb0ebdfb8ebbaa2d36f6dc0424c8f26b6594a390ae0eaafd319ab0

                                      SHA512

                                      34a62ebe8d057a6f6e6f6b2672ebb95d4d7c49e739f4beee4bbfb5e917b7176aba4d70b0e84bd727c967d0885c08264dfb42371fe0d3fe4f8f12dbb1e26ca69a

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_en-GB.dll

                                      Filesize

                                      27KB

                                      MD5

                                      fe685e8edec8a3b3c16e7954b787e118

                                      SHA1

                                      ac71544158bf86d357d78d003f5ff2b4b5fd4ef3

                                      SHA256

                                      4b60ce6e3c8f725ad8e88cd0d0a3f0155a7145915670a532fe1143fb2dfbf49e

                                      SHA512

                                      e30d12a607d1c6fd2060ab38f443af680f8c8655900b0a21f3f0b488033f9300915667bdfa59ff4fd3488f58ac52c7f5598ff5078bf849bd177d1d8c10533f04

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_en.dll

                                      Filesize

                                      27KB

                                      MD5

                                      be845ba29484bdc95909f5253192c774

                                      SHA1

                                      70e17729024ab1e13328ac9821d495de1ac7d752

                                      SHA256

                                      28414cd85efe921a07537f8c84c0a98a2a85fdbd5dfa3141e722ed7b433d0a96

                                      SHA512

                                      2800ec29ece429151c4cd463c5042492ac24e82b4999a323607d142a6e1a08cb69258190a6722afbbcfb3c9cdc6eebdedf89ee6549e0f420f6fbae3aa0501fd4

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_es-419.dll

                                      Filesize

                                      29KB

                                      MD5

                                      dc8fcfbcd75867bae9dc28246afc9597

                                      SHA1

                                      8fd9361636303543044b2918811dbdab8c55866c

                                      SHA256

                                      3deb382ffdfbd2d96ff344ec4339f13703074f533241f98f0ccd8d3f8c98f4bd

                                      SHA512

                                      ac8fbf033677a6862f3d02cf93bf1838c24f006b40fd44336ae13ecc2287ae4c733cc3d601e39556586131e8a9e2d930814399ac68165a26458a6cbf51b11d32

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_es.dll

                                      Filesize

                                      29KB

                                      MD5

                                      9c0ef804e605832ba0728540b73558a7

                                      SHA1

                                      a305f6b43a3226120d3010ca8c77441f6a769131

                                      SHA256

                                      626835e07c1fc4ab670127682f3e5225881a2d4ddea873c5271e9032668fa641

                                      SHA512

                                      c27a4b24600bdd33a4f9430e8d4d8f7f3718efcaf2d1ec36023e34b996817af79b5a9baeea1506f97d2716c9b2b5509bbc1bf4d7cab779554eebadaa8c942dfe

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_et.dll

                                      Filesize

                                      28KB

                                      MD5

                                      111118683f6e8ed7ceb11166378aebb0

                                      SHA1

                                      fd3e1cf198885ab5d9082d540d58f983d8a0f5ff

                                      SHA256

                                      5cc4930c50716138e25987baacb9a9aed7d30ff5c0ac927e35f7fc006f5179c4

                                      SHA512

                                      cc3480f05d8d59d3d705204e15ff6453a6d9c77bdb1011d069bb1f83b3d4e14204f19caa7e7ecbb6e3ed92d429ac46940791903440fbfeca2f7e7e12b9a47f6c

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_eu.dll

                                      Filesize

                                      29KB

                                      MD5

                                      c0da1ad8854f64b7988d70c9db199d5f

                                      SHA1

                                      b184335283bf0026615f2a4a120fda87961c774b

                                      SHA256

                                      73190820d59e5bfe769b82ada48b0c9ed353524bd5cab303f5175d7d9bbb74ee

                                      SHA512

                                      424ef2d0ceaba76b64c3349ec1ff5088cb8aff9103fb38da238c80e6452a967f3dca09860b2b8fe9c01e20bebadc539960a5bc241a91bab98bfedf29c2f777ea

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_fa.dll

                                      Filesize

                                      28KB

                                      MD5

                                      c4cb44ee190c5aa8dd7749659437e5cc

                                      SHA1

                                      667f4aa01a4262fff2e01838f94330c0ebc285a2

                                      SHA256

                                      dc184d54d00d51d2f8de623c0c4b07e9408f7b02e1f1085107edaf14dcbee136

                                      SHA512

                                      0330d733e89811c4a89deb202ec517de3128ad266483f37bd8d91eb6e45336febf7297da4f3465c683ed1b6e08114d6a3f52ff74484276509b9816ae7dccbb10

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_fi.dll

                                      Filesize

                                      28KB

                                      MD5

                                      a9b037f7bc8f5b382bf6c69b993dbeb1

                                      SHA1

                                      7beb733f3561ac3083a3dfca3b7644c5154e1330

                                      SHA256

                                      b498d1b38a81199b62a98a0e36aa9e955e1c0143436908538314089c0e59d128

                                      SHA512

                                      a63c1e1a4d8d2e5043e0cdc420d1c545b0adbcdaa1a65f09454d47cc9642c1ffcb16e76454e90c75fd88f29917024b11418a606acbd560a98b79cd8631186332

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_fil.dll

                                      Filesize

                                      29KB

                                      MD5

                                      6b2319c3634103272f39fc71d7f95426

                                      SHA1

                                      a1d692a68c5cbb70d29a197ec32c9529c15a0473

                                      SHA256

                                      28c610ba7f8332be050c30e296acaee423bc0a7a9cacc7b3d60618e284ff9cfa

                                      SHA512

                                      51738dd14b410c689ed56530ac555824c773bcb163f4dbaddc86e684e04c1f06271001f0b2bef7d6231f17231b2e3e35f9aba2974c48eff6d1a8ab877e5a6031

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_fr-CA.dll

                                      Filesize

                                      30KB

                                      MD5

                                      8e1793233c6e05eeaf4fe3b0f0a4f67c

                                      SHA1

                                      97697fe9ba6b3cb5cfe87bb94587c724ed879c3b

                                      SHA256

                                      b9caaa668b71964316ee15e6e49f8ae81e5ed167fdb69fc31bc6df834ab4e7a5

                                      SHA512

                                      3d2fbf5e05e7b9e21c85ad7f59db9556046e4c1755f0b138d6de38eeadd3480e772e35798f9339aa7daffbf92afbc385f9c0bb4e4f5c65292dff3b280f52bd6f

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_fr.dll

                                      Filesize

                                      30KB

                                      MD5

                                      5e63ac4b5abe6c84f305898a0f9ba0bb

                                      SHA1

                                      e70baf6f175c297a9b491272ce8f131ba781553c

                                      SHA256

                                      711b5968d2116d7e97aa5852ec864db35d3c186f341fb024cd1ef4525256131a

                                      SHA512

                                      c383e4df4337bf9a66f684dabd2faa95cb49abb424c76d0603f91af7b7260be5b2877246da293d5df83fdb59d291d63a7d73303c34682a50ea84a8fcd7d6e874

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_ga.dll

                                      Filesize

                                      29KB

                                      MD5

                                      f7b123f6dd6c8d8832a8bb8b7831e42c

                                      SHA1

                                      7e9524b79036568b2b4446ee00c76460fb791c6d

                                      SHA256

                                      119b9e288832f2a4d47d63b693bb195a72f27e9c0aa014b2c3ccd5d185f7afc7

                                      SHA512

                                      6bd457d1e3f943a4ca5a1d36907fe526a4f2965a8411280a2988ef1d264203af0797365c1306e7ce103cabec2ead17d194f20848b4c665e986705c3ed6e291c9

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_gd.dll

                                      Filesize

                                      30KB

                                      MD5

                                      6de337fa9f131077042f7ce421a9fa42

                                      SHA1

                                      25e21b64cdf60a1da2f940b3c873eefd680a5fc9

                                      SHA256

                                      263e07308785bd7e510eda95499ab3d3d66942f0bfd0a5722258e2a87b5d0a90

                                      SHA512

                                      e747fc105c4ede0d4f73492e3757975a9410499caf867bc149cd43bdbf1be03d3df82fe04c7cf99e3ad6ee06fb5011fc5b069bd502c2f3b3e578f587d0362e3d

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_gl.dll

                                      Filesize

                                      29KB

                                      MD5

                                      be03945025cc2f68f8edd4e1ca3c32b7

                                      SHA1

                                      d4b1c83f6b72796377bfd3b42c55733eed8fc5e4

                                      SHA256

                                      aa95c108db3582a4be98fe83519aab3fed09c8cc9b326469edb89871d6562373

                                      SHA512

                                      a03656acfc123f06a071f0e326ce15bf17e2efe080fa276acd50cb40e35000d74a3d0762da327c59a7564bb3f03532bf04c733ae850852f62ce71fd513e9080a

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_gu.dll

                                      Filesize

                                      29KB

                                      MD5

                                      951dfd4709b3fdbe79a6e43828387592

                                      SHA1

                                      0c7bbf1852135456692970639869618fb616ba5e

                                      SHA256

                                      21c72dc48cd33291520e3f432d8d59ec103496ab6508f41fa1b081b3bdf98bb8

                                      SHA512

                                      b338c345db00135ceb3577a67bcbc36b37be742e39aa6a333bac93ba20ab1463df55a381be95c9e9effaed4daa0ce93203ff2994459f9a23813dc0afdff03e8d

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_hi.dll

                                      Filesize

                                      29KB

                                      MD5

                                      6b97796e1746317567ed7cffe9441d3b

                                      SHA1

                                      dd269b22021eb37fe854ff181a09bf7f9568f7ac

                                      SHA256

                                      a4ce75f6b1de6a2500bfd6b0ebc1c268cb3d7080dc9e7661bedd9361f7215d42

                                      SHA512

                                      f1856ac881de7acb7f61f2d7c1d064458855c3621fcfa951f1d1207f3d85fd6f64b26547ea1391c4145bdeee23e6611acb2fe80b8c1258dd108085e371d34d73

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_hr.dll

                                      Filesize

                                      29KB

                                      MD5

                                      8bbd58f9644187747407b0a18c60aa0a

                                      SHA1

                                      82888f3f2ce1dd7b9b3f5ac26bed0a6da5601dff

                                      SHA256

                                      35008c4ea7f22ac78d28e72311d4b3fa28d6af24072fa94558a9b3771a4b545e

                                      SHA512

                                      1fa7d62692062c1d22e3fe0e5c15bfbb2def115be2991001a998fcc6bbb5983d9343b06172e8f38b245587b15762b655ef58ec508160b576779963e5889efca8

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_hu.dll

                                      Filesize

                                      29KB

                                      MD5

                                      e56f98d6b32f82f391d5b087a135a7ec

                                      SHA1

                                      c8de62b4b22a8153cb788e03f7e04c55a5ae5396

                                      SHA256

                                      236252a34d2efdb4e801bd827a791935aadfe6c0a471f1b252d9bf2d291a6bae

                                      SHA512

                                      45b9933478505759e7217a65e3a054885841c5ae9bc58983c6cb216ea2a15c53f45ecfb6b40fee07d54c289819ddc2161a651e5183e244e0f43946176f224c8a

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_id.dll

                                      Filesize

                                      28KB

                                      MD5

                                      5b5366c7779dc9ce9f3a15b6f22289ac

                                      SHA1

                                      d9995fee337b9696be970a2a48a845ed71bd7d2b

                                      SHA256

                                      da6d5c982387286396f54c043bacf106f78fc76db4a33984c8b2cb88882fc9b3

                                      SHA512

                                      35362a3719833449bd9e757194f9b0b28c3d68a0c62f52d224b1cd5eca5a2343e1db868668e2b30d927a1966b5db5cd0b2230d7f4576627e486eb3a86913b195

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_is.dll

                                      Filesize

                                      28KB

                                      MD5

                                      b675cc1f6f5f174c265c0887d9591915

                                      SHA1

                                      abb182cfbe1d5723ecc380c5fa08b24c1f421af1

                                      SHA256

                                      c012110ad65f8244494ef2aa70696128a949fbc5797e5139afa7d4195457df1f

                                      SHA512

                                      be1b23a563a2b4f6b658df3f8075d48bf3921c5951a6fbe77c24a0949997e068403f5bcaa3f93030b01d7a69b1aa74ce06f37038c30145e03a9822f4854f7c0d

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_it.dll

                                      Filesize

                                      30KB

                                      MD5

                                      b8b03be1e73e1ccc0df159c48e875038

                                      SHA1

                                      37d1b2216f1e90a69b1be65b2c4f0f5f35e78aef

                                      SHA256

                                      4ee8f48af5136fb80f5d031395f92abb2b3571fdf7c4c98ae833c2ee74c49160

                                      SHA512

                                      ef47c8c0f8aed7a4d912986e2a3fbc34b54fdea25b006bcb63d502a6cefc42bca717a93e16ff1c137892a91b894ea15d95a53dd3b52b850bf1a75ec9bd7b3013

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_iw.dll

                                      Filesize

                                      25KB

                                      MD5

                                      dede65e2268976ded6f598ecea661025

                                      SHA1

                                      45c6fd614dac74eecf83709081b4f289c05271dd

                                      SHA256

                                      9379736bb1b621367e42736d311288d33742a9e0ca3e056b4638491fc434a880

                                      SHA512

                                      92a46ca5e3c40bf55fede64aecd7fd05f6419c645d38325546c46632775fe72cff4152e473ffbc15d478da62c76a088ebfb4db91b9a0691a9ce1c763ad3f9285

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_ja.dll

                                      Filesize

                                      24KB

                                      MD5

                                      ffc1ff9f4cb8fcb529f8580d3b92a80c

                                      SHA1

                                      d0ef21a7407c5eebe1fc21b6549c92c6222bf0cd

                                      SHA256

                                      d508f613bbec62a237a5616959dbc292fe4a79adc8783fb91725f3f2c32658d2

                                      SHA512

                                      6345362f03f3bc4409c1e5875b2e7cb58b5df9737c9c5502a19314046281e682a3ea7ac5adbbb933a130f52efad4da4eb9ad99ebfdd41bdba23d1fbea4180475

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_ka.dll

                                      Filesize

                                      29KB

                                      MD5

                                      e802f3589731c88d166a8b0e3bae1dc7

                                      SHA1

                                      b94e21b646c26053c19a0e6238f0e4fbde0a2fa6

                                      SHA256

                                      173f78b786cd1a58a47ec9f7c662e403b191fa42cb7308aa7eb6b0f744bfae0b

                                      SHA512

                                      ecf9eb33afb00c6839d6778e36685b904267e6f384a7d307230000a506e6ac6e95132c2f50a4cbe523d834dd6c7ecd1277d47b73188130e097a0b64c0ec64a51

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_kk.dll

                                      Filesize

                                      28KB

                                      MD5

                                      1c6f35c21ff0afb2f4aa9d4352fc86f2

                                      SHA1

                                      d4bf67c14304add3e7d8218ff66a520a7b1e0a6e

                                      SHA256

                                      779900e90b23d0443e0b93b4ac7c8fa24dd6a0ebddb36cd22bcd7a1a6fce2ecc

                                      SHA512

                                      caf80f4adab14a81bb14e36683772539a6789448ddfcaba2a09e5c6c3e2dae105ce436ca7dd7b412c6c73dcc0768141822b13064d452a48a37721e1e9dd357f2

                                    • C:\Program Files (x86)\Microsoft\Temp\EU39A9.tmp\msedgeupdateres_km.dll

                                      Filesize

                                      27KB

                                      MD5

                                      9dc0ee4f6b7e239018d6962b5097669c

                                      SHA1

                                      3b091cd8dc4f46ec7603c56d2ebf73385576031e

                                      SHA256

                                      4d31ba95fb2adf05ea6fb9b1896f09c872c228187bd3d2f979b162097ea18979

                                      SHA512

                                      aca659bcb9dfe59bd23dabcf2051b8529b0a1b9f2c1a0748ff29ffb02307222dc3a5d8b7aa42f6469200992e6cca14886908eb624f9f1959095133b09f3752d6

                                    • C:\Program Files\MsEdgeCrashpad\settings.dat

                                      Filesize

                                      280B

                                      MD5

                                      645cf6d30189f32c12ec885f4271a3df

                                      SHA1

                                      3a17544458270d7f01688679909bcd85a4b02f15

                                      SHA256

                                      09a516dee3d51aef2f325c9a14b611067160dca91090e70a0a86d5ca794aab97

                                      SHA512

                                      ca00225b4ce762b55e788bb525d6122a2dc2a65bbba3dbc6be1515fd8f4461b07a830eacfa3e57d3906b1e83445d37c554f98eaae5188517f2c406e4f470702f

                                    • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                      Filesize

                                      66KB

                                      MD5

                                      32438a4b04c32ffe12da2f90548913fd

                                      SHA1

                                      58dd2b14911f61f10ffaab71bb2db79e0d20b057

                                      SHA256

                                      03922a75ce3bf9963efc0ce6378f9c1b4e83fc997109e52aa6df0a8e066b5f18

                                      SHA512

                                      ee15f48ea83d801d24c9562f98cd595c7811dbf6df5ae0abd0684944a091de61563d9449eb5bbd20233ea29a3de5830e9faa40b6968fea8add00464b39a408f0

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      eeaa8087eba2f63f31e599f6a7b46ef4

                                      SHA1

                                      f639519deee0766a39cfe258d2ac48e3a9d5ac03

                                      SHA256

                                      50fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9

                                      SHA512

                                      eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      b9569e123772ae290f9bac07e0d31748

                                      SHA1

                                      5806ed9b301d4178a959b26d7b7ccf2c0abc6741

                                      SHA256

                                      20ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b

                                      SHA512

                                      cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      265B

                                      MD5

                                      f5cd008cf465804d0e6f39a8d81f9a2d

                                      SHA1

                                      6b2907356472ed4a719e5675cc08969f30adc855

                                      SHA256

                                      fcea95cc39dc6c2a925f5aed739dbedaa405ee4ce127f535fcf1c751b2b8fb5d

                                      SHA512

                                      dc97034546a4c94bdaa6f644b5cfd1e477209de9a03a5b02a360c254a406c1d647d6f90860f385e27387b35631c41f0886cb543ede9116436941b9af6cd3285d

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      8f8d80bfb09ff50941b9f7fa6c47a93a

                                      SHA1

                                      9d916f78f95e45072840cd25c9a8d5cb01159606

                                      SHA256

                                      1ed43e7252b7d92936043bafd12b3a84fea912b3b80c450d1914e9cf4a71d1f6

                                      SHA512

                                      8910e0edde5c689fdd7532026f63b0b03f7f4a21fa00aeef21e0cd3cffb70a4156dbed060ed40117b8f2432802866f1b20f006d450014017a9285d245d9bef10

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d764da04-5803-4230-bf01-3f73653bd5c4.tmp

                                      Filesize

                                      6KB

                                      MD5

                                      98c81b9fb0461c9fa4fecb2b7a0049d6

                                      SHA1

                                      e3f5058b316ac701555f785e59f3df74ff895d7e

                                      SHA256

                                      62ca49981275dc531242f4930cf85029460ed6814540a18195e206368b7df0ad

                                      SHA512

                                      2282e745c22de09a0f436b75172db885c23db78a7c778f7ebd29f795266233f5393813d4e497021c26d8d8758c51ceaf9dc5fe6df2982a26e8852b12c484fd71

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      6752a1d65b201c13b62ea44016eb221f

                                      SHA1

                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                      SHA256

                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                      SHA512

                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      10KB

                                      MD5

                                      0828b92042c054efe339d1c5e8c51f57

                                      SHA1

                                      4408d7894617d9b8ef85b6807707b9e5f9575318

                                      SHA256

                                      bdc7f7f12cb4cc5dd2671abf0b441667c6a0e28bfc22da3fe2fea3c665bf86b1

                                      SHA512

                                      33b068a8feb59e6277a9112db00d9d5b221dfd575a662289fcf9059eec036f1798163fc01afa5dff8db372300c375f62e2d9b58e7892c13bb315da48db038d4b

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      10KB

                                      MD5

                                      326a2d48cbb467c16ded05dfb7989ad3

                                      SHA1

                                      0522b572f4a967d6ba9f351c48feda7d33caac47

                                      SHA256

                                      090e3b19476707839aabe6902ac7d296b11d05d32854eee6c176c79ae923604d

                                      SHA512

                                      e56e454dba1d1b7a89214dbc60beabf24303d23822df9a1158159eeadbff8f13d4fac1625be6cffaf22a9c15562b27a21ff5dcb69cebe3de3fc784b898c60f58

                                    • C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe

                                      Filesize

                                      1.6MB

                                      MD5

                                      d2ebd82a5d3fac11d44d90d8df253bb9

                                      SHA1

                                      ba94b456e111ea9573fe150ad4090a66540c9938

                                      SHA256

                                      04b65aa7b23d0c7ebbd6e022a600fbc43c0ee896ed280e48ac59e17fb0a2311d

                                      SHA512

                                      49e9ef8066200cd6ec079943c1fbcda95cab2d3042f635ed57949e0c0701ecdf34ea8f16324994dc77bc3ec9fc67882ea88b4d543974e90bf4e8cf69b15e073c

                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0ausxe2m.a31.ps1

                                      Filesize

                                      60B

                                      MD5

                                      d17fe0a3f47be24a6453e9ef58c94641

                                      SHA1

                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                      SHA256

                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                      SHA512

                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                    • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Crashpad\settings.dat

                                      Filesize

                                      280B

                                      MD5

                                      488a6ce63287ee221d447c2bdc3f6cd6

                                      SHA1

                                      ccaa3f71fc345c0a657a63085f34530bdc8a908e

                                      SHA256

                                      0d40d91fb03a2cd5bea0b2e470ab5d700a3578e9daf828d0e278a3a6210f5f38

                                      SHA512

                                      8c29dcd33ca8e220e0f55b8914f96d3b8b5238f08135b205640c83b915d96807e7f2de1760da9ef4c8d8b0d05b8e393e3a98ca86c7683650aad36b12c4d4340c

                                    • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Default\501cb7c2-148c-4657-81ff-7838c34b409f.tmp

                                      Filesize

                                      6KB

                                      MD5

                                      64b014ab8b65a2aa12610d92ae0fa8d4

                                      SHA1

                                      c6708bb81e4fed974a761daef4a01413090d604d

                                      SHA256

                                      530790c98d7b66a1fe00bc683a2154835e006fcdb96c2215631f3d6bdf45e842

                                      SHA512

                                      a15338004a6c1d55b2624ced09c5251327495869598e488043773e4a67e286d116fc459ff6e092896eabbf874dc8b632b9d93910d5b998ba0222af756d917fb9

                                    • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      48B

                                      MD5

                                      96f9e010a975b717f6189b738f75483b

                                      SHA1

                                      f52e042c0eb0e60d91ba5dcfe3e5e088fb67d9a8

                                      SHA256

                                      1a9a44f79ba708a0415193786c983eb6cb9f8cf614126c0de97b173b44d1cbb8

                                      SHA512

                                      33faf9c637b53d825ac91aab53c799c745d8f9f7dcd92d56419a33c65626e3f361f860b3eccb71d7f239c3ca5b6ea1bb9557f49c63f032d91049d1da54d557ce

                                    • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      96B

                                      MD5

                                      fdf447d3e886df063b7bdf3a7be7ce6f

                                      SHA1

                                      244be0641688ef881706091665386269bc73a84e

                                      SHA256

                                      78c8ebdf0ac2a010a71184e59f91026341606d48a92b0911a910b47863f7f2cc

                                      SHA512

                                      9fdf0f8417a6c00aaef4e362156b30c10eed4ac46036fe8e6f226cb3d9d4640fb5470f320a39079cb3aff9e3e01809eae24c463f6bfde891c322eda89ae0035d

                                    • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Default\Extension Rules\MANIFEST-000001

                                      Filesize

                                      41B

                                      MD5

                                      5af87dfd673ba2115e2fcf5cfdb727ab

                                      SHA1

                                      d5b5bbf396dc291274584ef71f444f420b6056f1

                                      SHA256

                                      f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                      SHA512

                                      de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                    • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Default\Network\Network Persistent State

                                      Filesize

                                      111B

                                      MD5

                                      285252a2f6327d41eab203dc2f402c67

                                      SHA1

                                      acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                      SHA256

                                      5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                      SHA512

                                      11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                    • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Default\Network\Network Persistent State~RFe59f14c.TMP

                                      Filesize

                                      59B

                                      MD5

                                      2800881c775077e1c4b6e06bf4676de4

                                      SHA1

                                      2873631068c8b3b9495638c865915be822442c8b

                                      SHA256

                                      226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                      SHA512

                                      e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                    • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Default\Network\SCT Auditing Pending Reports

                                      Filesize

                                      2B

                                      MD5

                                      d751713988987e9331980363e24189ce

                                      SHA1

                                      97d170e1550eee4afc0af065b78cda302a97674c

                                      SHA256

                                      4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                      SHA512

                                      b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                    • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      b06ddf907d6289547408759090bba89c

                                      SHA1

                                      5bad01ecd89c6ea4afbaf30c7917f200dd498671

                                      SHA256

                                      f6014517f1ca99ac3040bc64786b7e6d48351e4bfbc9db46e360e6ec1e9ce15e

                                      SHA512

                                      8b3ea2f2ee75f6d99b75dfadbcfa31172d6a66daefd6a0b9c8afd53f907206266ef58370023b7ea497b33bf50de5753414b07ef555e7a550d020aaa411a514ef

                                    • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Default\Site Characteristics Database\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      46295cac801e5d4857d09837238a6394

                                      SHA1

                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                      SHA256

                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                      SHA512

                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                    • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\GrShaderCache\data_0

                                      Filesize

                                      8KB

                                      MD5

                                      cf89d16bb9107c631daabf0c0ee58efb

                                      SHA1

                                      3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                      SHA256

                                      d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                      SHA512

                                      8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                    • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\GrShaderCache\data_1

                                      Filesize

                                      264KB

                                      MD5

                                      d0d388f3865d0523e451d6ba0be34cc4

                                      SHA1

                                      8571c6a52aacc2747c048e3419e5657b74612995

                                      SHA256

                                      902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                                      SHA512

                                      376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                                    • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\GrShaderCache\data_2

                                      Filesize

                                      8KB

                                      MD5

                                      0962291d6d367570bee5454721c17e11

                                      SHA1

                                      59d10a893ef321a706a9255176761366115bedcb

                                      SHA256

                                      ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                      SHA512

                                      f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                    • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\GrShaderCache\data_3

                                      Filesize

                                      8KB

                                      MD5

                                      41876349cb12d6db992f1309f22df3f0

                                      SHA1

                                      5cf26b3420fc0302cd0a71e8d029739b8765be27

                                      SHA256

                                      e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                      SHA512

                                      e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                    • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Local State

                                      Filesize

                                      1KB

                                      MD5

                                      a62556f7f6101605da08750c87a46523

                                      SHA1

                                      1ce264cb9a3f8c1acd480c42d073be70d0b37e0b

                                      SHA256

                                      570b4d773c1783ae1a2523c5db6ad8fb25c91c0acf6a93c64ca149aeb7d4bea2

                                      SHA512

                                      b945f71cc25237462f36d81a2de651db40857b3cbf72b667999fe576c6552051b60c33de7636c398333dd4ed7f3bc9892891ef91d3396c7d7821c85e76552a0d

                                    • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Local State

                                      Filesize

                                      2KB

                                      MD5

                                      674083bea1b48fd3417630980e742799

                                      SHA1

                                      1eb6cdde6e9321adefb5bfe5d46ea16c93f421e0

                                      SHA256

                                      221fd8d335a10d2c3983946841cd5328bcc542501a0dd6c6ab668c87fa512917

                                      SHA512

                                      9f14eccd38027629c217ed255a0f24ff6e4e3b2aee7ee33b59ec626ba4e03e2c854985745de8b38a617731d05c6c0debf73963bff605c701eac753cdadd75d97

                                    • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Local State

                                      Filesize

                                      3KB

                                      MD5

                                      cb5d02f8ba32c7a72324274b8d6ebfb7

                                      SHA1

                                      5026f89c4f665e789b0af0825d4b66323b5dadb1

                                      SHA256

                                      57f0d474455a9b4142e019606bb6fc7091767ef5e89d2f7d953ad783177ece73

                                      SHA512

                                      77b2e82bed9df6bb66a04347da44e74318bdf57cf99418834540128191fb03c0175d4876c0461e7467488a5afea374eb683a476733330c62c72b37dab240462e

                                    • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Local State

                                      Filesize

                                      16KB

                                      MD5

                                      f5901401cb8132e50989a48a711fdac3

                                      SHA1

                                      69a74d8f1265b59289f8d3fcc5dcb51a92e8f4c3

                                      SHA256

                                      fb334654a7f90a903c2ab6af2b172d763afd221f90525a8f3cef6506f278f33a

                                      SHA512

                                      7a951227515ba04dc4e3398119a2d0aacc47a797694c3e213b51170c8292f9332526492129c6e59d4f93fdbfb7e59f072f1cdcae2ab498cf7a9aa82d0bf737a5

                                    • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Local State

                                      Filesize

                                      16KB

                                      MD5

                                      9a46f6d57d703622e6072be76653cbbe

                                      SHA1

                                      45acc028b7b23bc8d9726ccaf67334f2752f004b

                                      SHA256

                                      03ac4619824d5d43588eacb84aefffe6f14a39c6b497b35df9001b9c891c5335

                                      SHA512

                                      a01c3d1533ea489254112fbe19f132e50cab35c30420caaf73ecdf48bf24c1224d66040309dec2b217da557bab738506718de0e4bd54121c6974d96cc35c55bf

                                    • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Local State~RFe596c7c.TMP

                                      Filesize

                                      1KB

                                      MD5

                                      09976502304bff4ce195ac5a0969f370

                                      SHA1

                                      b1bd219d9b132dce0f6765f4afc0c98236e811cc

                                      SHA256

                                      4ce0cec04b47fe239b8ff14646b03c8f3972aac7b1c840a7c06a1132feb5f89b

                                      SHA512

                                      6045a544afa297711f08fdee9324235f8b6ea918c1464cfdd6d956ed77eab5c2d33c9ab9febe63a9e42a4863301dd3741a2dc4bb2a371ccdccfef0fa4b4081cc

                                    • C:\Users\Admin\Downloads\setup.zip

                                      Filesize

                                      16.2MB

                                      MD5

                                      1baf851f46a5ea24e21ebd492d6b745c

                                      SHA1

                                      308f821d54bdc34d51c0ab69353fdb7f013cf19b

                                      SHA256

                                      3f86aac3627bc0050d3c823a3195f6c192f5fb15e080442c1f910453163078c2

                                      SHA512

                                      14d4b66272b63293b94a481e138efdec8c399628b40f4ff6137b107c7f38f0b00a71c4471e39428c13ab1b40cff76675cf26c7db4adb3d1f443a92947c188bae

                                    • \??\pipe\LOCAL\crashpad_1808_WUINVOCZKUXJFWYT

                                      MD5

                                      d41d8cd98f00b204e9800998ecf8427e

                                      SHA1

                                      da39a3ee5e6b4b0d3255bfef95601890afd80709

                                      SHA256

                                      e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                      SHA512

                                      cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                    • memory/2160-617-0x00000211D6AC0000-0x00000211D6AC1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2160-614-0x00000211D6AC0000-0x00000211D6AC1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2160-616-0x00000211D6AC0000-0x00000211D6AC1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2160-618-0x00000211D6AC0000-0x00000211D6AC1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2160-619-0x00000211D6AC0000-0x00000211D6AC1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2160-620-0x00000211D6AC0000-0x00000211D6AC1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2160-615-0x00000211D6AC0000-0x00000211D6AC1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2160-607-0x00000211D6AC0000-0x00000211D6AC1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2160-608-0x00000211D6AC0000-0x00000211D6AC1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2160-609-0x00000211D6AC0000-0x00000211D6AC1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/2400-717-0x00000000031D0000-0x00000000035D0000-memory.dmp

                                      Filesize

                                      4.0MB

                                    • memory/2400-722-0x00000000006D0000-0x000000000074E000-memory.dmp

                                      Filesize

                                      504KB

                                    • memory/2400-720-0x0000000076A90000-0x0000000076CA5000-memory.dmp

                                      Filesize

                                      2.1MB

                                    • memory/2400-718-0x00007FFD0AF30000-0x00007FFD0B125000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/2400-714-0x00000000006D0000-0x000000000074E000-memory.dmp

                                      Filesize

                                      504KB

                                    • memory/2400-716-0x00000000031D0000-0x00000000035D0000-memory.dmp

                                      Filesize

                                      4.0MB

                                    • memory/3296-423-0x00007FFD0A860000-0x00007FFD0A861000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3296-422-0x00007FFD0AC50000-0x00007FFD0AC51000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/3636-350-0x00000000009B0000-0x00000000009E5000-memory.dmp

                                      Filesize

                                      212KB

                                    • memory/3636-249-0x00000000009B0000-0x00000000009E5000-memory.dmp

                                      Filesize

                                      212KB

                                    • memory/3636-250-0x0000000074A40000-0x0000000074C65000-memory.dmp

                                      Filesize

                                      2.1MB

                                    • memory/3636-291-0x0000000074A40000-0x0000000074C65000-memory.dmp

                                      Filesize

                                      2.1MB

                                    • memory/4672-339-0x00007FFCEAD50000-0x00007FFCEB006000-memory.dmp

                                      Filesize

                                      2.7MB

                                    • memory/4672-338-0x00007FFD00690000-0x00007FFD006C4000-memory.dmp

                                      Filesize

                                      208KB

                                    • memory/4672-337-0x00007FF7BC920000-0x00007FF7BCA18000-memory.dmp

                                      Filesize

                                      992KB

                                    • memory/4672-340-0x000001D95A7E0000-0x000001D95B890000-memory.dmp

                                      Filesize

                                      16.7MB

                                    • memory/5024-379-0x00007FFD0A3B0000-0x00007FFD0A3B1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/5316-453-0x00007FFD0A3B0000-0x00007FFD0A3B1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/5520-509-0x000001FCC6E70000-0x000001FCC6E92000-memory.dmp

                                      Filesize

                                      136KB

                                    • memory/5608-721-0x00000000001A0000-0x00000000001A9000-memory.dmp

                                      Filesize

                                      36KB

                                    • memory/5608-724-0x00000000022A0000-0x00000000026A0000-memory.dmp

                                      Filesize

                                      4.0MB

                                    • memory/5608-725-0x00007FFD0AF30000-0x00007FFD0B125000-memory.dmp

                                      Filesize

                                      2.0MB

                                    • memory/5608-727-0x0000000076A90000-0x0000000076CA5000-memory.dmp

                                      Filesize

                                      2.1MB