Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-09-2024 12:42

General

  • Target

    https://github.com/Gamer1985/KRNL-executor/releases/download/Download/setup.zip

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 20 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 26 IoCs
  • Loads dropped DLL 41 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Checks system information in the registry 2 TTPs 12 IoCs

    System information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Detects videocard installed 1 TTPs 1 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • GoLang User-Agent 2 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 43 IoCs
  • Modifies registry class 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Gamer1985/KRNL-executor/releases/download/Download/setup.zip
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:396
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ef2a46f8,0x7ff8ef2a4708,0x7ff8ef2a4718
      2⤵
        PID:4692
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,3950712383324044171,18093697299203061881,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:2
        2⤵
          PID:4860
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,3950712383324044171,18093697299203061881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2376
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,3950712383324044171,18093697299203061881,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:8
          2⤵
            PID:4960
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3950712383324044171,18093697299203061881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:1
            2⤵
              PID:4708
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3950712383324044171,18093697299203061881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
              2⤵
                PID:3784
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,3950712383324044171,18093697299203061881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:8
                2⤵
                  PID:3240
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,3950712383324044171,18093697299203061881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5440 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:4480
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2040,3950712383324044171,18093697299203061881,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5296 /prefetch:8
                  2⤵
                    PID:3040
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3950712383324044171,18093697299203061881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:1
                    2⤵
                      PID:5040
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2040,3950712383324044171,18093697299203061881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4172 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1640
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3950712383324044171,18093697299203061881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:1
                      2⤵
                        PID:1240
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3950712383324044171,18093697299203061881,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:1
                        2⤵
                          PID:3680
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3950712383324044171,18093697299203061881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6396 /prefetch:1
                          2⤵
                            PID:5292
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,3950712383324044171,18093697299203061881,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6424 /prefetch:1
                            2⤵
                              PID:5300
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,3950712383324044171,18093697299203061881,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5212 /prefetch:2
                              2⤵
                                PID:5536
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:2620
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3412
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:3996
                                  • C:\Users\Admin\Downloads\setup\setup\myproject.exe
                                    "C:\Users\Admin\Downloads\setup\setup\myproject.exe"
                                    1⤵
                                    • Loads dropped DLL
                                    • Maps connected drives based on registry
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:5824
                                    • C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe
                                      C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • Drops file in Program Files directory
                                      • System Location Discovery: System Language Discovery
                                      PID:6012
                                      • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\MicrosoftEdgeUpdate.exe
                                        "C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\MicrosoftEdgeUpdate.exe" /installsource taggedmi /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"
                                        3⤵
                                        • Event Triggered Execution: Image File Execution Options Injection
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Checks system information in the registry
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:5736
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          • Modifies registry class
                                          PID:3332
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          • Modifies registry class
                                          PID:2056
                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.19\MicrosoftEdgeUpdateComRegisterShell64.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.19\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                            5⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Modifies registry class
                                            PID:884
                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.19\MicrosoftEdgeUpdateComRegisterShell64.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.19\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                            5⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Modifies registry class
                                            PID:4288
                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.19\MicrosoftEdgeUpdateComRegisterShell64.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.19\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                            5⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Modifies registry class
                                            PID:4380
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTk1LjE1IiBuZXh0dmVyc2lvbj0iMS4zLjE5NS4xOSIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNTA3OTczODc0NSIgaW5zdGFsbF90aW1lX21zPSI3MDMiLz48L2FwcD48L3JlcXVlc3Q-
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Checks system information in the registry
                                          • System Location Discovery: System Language Discovery
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          PID:1160
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource taggedmi /sessionid "{842EC54D-7156-4826-A1B5-083F57157D23}"
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of FindShellTrayWindow
                                          PID:5168
                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=myproject.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=5824.4912.12359837867709377934
                                      2⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Checks system information in the registry
                                      • Enumerates system info in registry
                                      • Modifies data under HKEY_USERS
                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                      • System policy modification
                                      PID:864
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=128.0.6613.120 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=128.0.2739.67 --initial-client-data=0x178,0x17c,0x180,0x158,0x188,0x7ff8d8479fd8,0x7ff8d8479fe4,0x7ff8d8479ff0
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:5316
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView" --webview-exe-name=myproject.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1848,i,4019208275098937658,2422727853700762060,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1844 /prefetch:2
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:3764
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView" --webview-exe-name=myproject.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1888,i,4019208275098937658,2422727853700762060,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1920 /prefetch:3
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:3892
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView" --webview-exe-name=myproject.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2240,i,4019208275098937658,2422727853700762060,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2064 /prefetch:8
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:4512
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView" --webview-exe-name=myproject.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3636,i,4019208275098937658,2422727853700762060,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3644 /prefetch:1
                                        3⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:1796
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView" --webview-exe-name=myproject.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=4660,i,4019208275098937658,2422727853700762060,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4712 /prefetch:1
                                        3⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:2476
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Downloads\setup\setup\myproject.exe\""
                                      2⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5576
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\Downloads\setup\setup\myproject.exe
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:3604
                                    • C:\Windows\System32\Wbem\wmic.exe
                                      wmic path win32_VideoController get name
                                      2⤵
                                      • Detects videocard installed
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4904
                                    • C:\Windows\system32\tasklist.exe
                                      tasklist
                                      2⤵
                                      • Enumerates processes with tasklist
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:5540
                                    • C:\Windows\System32\Wbem\wmic.exe
                                      wmic csproduct get uuid
                                      2⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3352
                                    • C:\ProgramData\driver1.exe
                                      C:\ProgramData\driver1.exe
                                      2⤵
                                      • Executes dropped EXE
                                      PID:5532
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Users'"
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        PID:680
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Windows'"
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        PID:3504
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Program Files'"
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        PID:2500
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Program Files (x86)'"
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        PID:5928
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Recovery'"
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        PID:6044
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\Imbasers'"
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        PID:5548
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath '%USERPROFILE%\Desktop'"
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        PID:6120
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\ProgramData'"
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        PID:744
                                      • C:\Imbasers\timbers.exe
                                        C:\Imbasers\timbers.exe
                                        3⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        PID:1780
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks /create /tn WinDriver /tr C:\ProgramData\Microsoft\WinDriver.exe /sc onstart /ru SYSTEM
                                      2⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:5548
                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
                                    1⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Checks system information in the registry
                                    • System Location Discovery: System Language Discovery
                                    • Modifies data under HKEY_USERS
                                    PID:5188
                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSIzNCIgaW5zdGFsbGRhdGV0aW1lPSIxNzIyNjAyNjc4IiBvb2JlX2luc3RhbGxfdGltZT0iMTMzNjcwNzUyOTM2NTYyMzYxIj48ZXZlbnQgZXZlbnR0eXBlPSIzMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMjExNDMyNSIgc3lzdGVtX3VwdGltZV90aWNrcz0iNTA4OTIzNjc3NCIvPjwvYXBwPjwvcmVxdWVzdD4
                                      2⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Checks system information in the registry
                                      • System Location Discovery: System Language Discovery
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      PID:2620
                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AF1F0617-CD2A-4576-9E6C-6665B5FA6A26}\MicrosoftEdge_X64_128.0.2739.67.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AF1F0617-CD2A-4576-9E6C-6665B5FA6A26}\MicrosoftEdge_X64_128.0.2739.67.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
                                      2⤵
                                      • Executes dropped EXE
                                      • Drops file in Program Files directory
                                      PID:4168
                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AF1F0617-CD2A-4576-9E6C-6665B5FA6A26}\EDGEMITMP_DB966.tmp\setup.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AF1F0617-CD2A-4576-9E6C-6665B5FA6A26}\EDGEMITMP_DB966.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AF1F0617-CD2A-4576-9E6C-6665B5FA6A26}\MicrosoftEdge_X64_128.0.2739.67.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
                                        3⤵
                                        • Executes dropped EXE
                                        • Drops file in Program Files directory
                                        PID:4648
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AF1F0617-CD2A-4576-9E6C-6665B5FA6A26}\EDGEMITMP_DB966.tmp\setup.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AF1F0617-CD2A-4576-9E6C-6665B5FA6A26}\EDGEMITMP_DB966.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=128.0.6613.120 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{AF1F0617-CD2A-4576-9E6C-6665B5FA6A26}\EDGEMITMP_DB966.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=128.0.2739.67 --initial-client-data=0x22c,0x230,0x234,0x208,0x238,0x7ff74f0016d8,0x7ff74f0016e4,0x7ff74f0016f0
                                          4⤵
                                          • Executes dropped EXE
                                          PID:2708
                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuMTkiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuMTkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7ODQyRUM1NEQtNzE1Ni00ODI2LUExQjUtMDgzRjU3MTU3RDIzfSIgdXNlcmlkPSJ7MkM0QUYxRkEtRTExNS00MDhBLUJDNzUtOEQ0QzU3NUIxQTM2fSIgaW5zdGFsbHNvdXJjZT0idGFnZ2VkbWkiIHJlcXVlc3RpZD0iezEwMTU1ODk5LUM1NTQtNDg5Qy1CODlFLTVFMDVGNTIzMDBFRH0iIGRlZHVwPSJjciIgZG9tYWluam9pbmVkPSIwIj48aHcgbG9naWNhbF9jcHVzPSI4IiBwaHlzbWVtb3J5PSI4IiBkaXNrX3R5cGU9IjIiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGMzAxNzIyNi1GRTJBLTQyOTUtOEJERi0wMEMzQTlBN0U0QzV9IiB2ZXJzaW9uPSIiIG5leHR2ZXJzaW9uPSIxMjguMC4yNzM5LjY3IiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaW5zdGFsbGFnZT0iLTEiIGluc3RhbGxkYXRlPSItMSI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MTAxNzI3MzkwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-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-
                                      2⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Checks system information in the registry
                                      • System Location Discovery: System Language Discovery
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      PID:3944
                                  • C:\Windows\system32\taskmgr.exe
                                    "C:\Windows\system32\taskmgr.exe" /7
                                    1⤵
                                    • Checks SCSI registry key(s)
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious behavior: GetForegroundWindowSpam
                                    • Suspicious use of AdjustPrivilegeToken
                                    • Suspicious use of FindShellTrayWindow
                                    • Suspicious use of SendNotifyMessage
                                    PID:1372
                                  • C:\Users\Admin\Downloads\setup\setup\myproject.exe
                                    "C:\Users\Admin\Downloads\setup\setup\myproject.exe"
                                    1⤵
                                    • Loads dropped DLL
                                    PID:5196
                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=myproject.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=5196.4956.17579806258913946394
                                      2⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:2716
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=128.0.6613.120 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\128.0.2739.67\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=128.0.2739.67 --initial-client-data=0x164,0x168,0x16c,0x140,0x80,0x7ff8d8479fd8,0x7ff8d8479fe4,0x7ff8d8479ff0
                                        3⤵
                                        • Executes dropped EXE
                                        PID:5560

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Program Files (x86)\Microsoft\EdgeCore\128.0.2739.67\Installer\setup.exe

                                    Filesize

                                    6.6MB

                                    MD5

                                    16dd69461337762007690317e733734d

                                    SHA1

                                    235528177001b7b413ae7f1af448d9867b4045ae

                                    SHA256

                                    e3a007015a353cea188804336cec71c961c7dbd3c89cd588818114ba66c806e3

                                    SHA512

                                    ed60676bdda50480d655cb1cb7edcf7d25355b9d40ec3b3906995d53a9860b259c77974d6f12e49e01e95997cc8d7ffdb4b441f4dab1992de11ee269f262f701

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\EdgeUpdate.dat

                                    Filesize

                                    12KB

                                    MD5

                                    369bbc37cff290adb8963dc5e518b9b8

                                    SHA1

                                    de0ef569f7ef55032e4b18d3a03542cc2bbac191

                                    SHA256

                                    3d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3

                                    SHA512

                                    4f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\MicrosoftEdgeComRegisterShellARM64.exe

                                    Filesize

                                    182KB

                                    MD5

                                    3a6b04122205ec351f8fbef3e20f65c4

                                    SHA1

                                    ba2e989a1f1963652405b632f5020e972da76a8c

                                    SHA256

                                    7ba65317643fbc0d03195bdeeba318732823a91ef27f62483d5fc0ed3fea4912

                                    SHA512

                                    2a0dbc91e79c42bf934ce7ab41ff6ed900322706bb71ffa1f3ade4ad85e0e1de2fa31540e1f1e0e979ad749c84343563ebe341585965f2f3a62debd6b4ab0cb0

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\MicrosoftEdgeUpdate.exe

                                    Filesize

                                    201KB

                                    MD5

                                    b0d94ffd264b31a419e84a9b027d926b

                                    SHA1

                                    4c36217abe4aebe9844256bf6b0354bb2c1ba739

                                    SHA256

                                    f471d9ff608fe58da68a49af83a7fd9a3d6bf5a5757d340f7b8224b6cd8bddf6

                                    SHA512

                                    d68737f1d87b9aa410d13b494c1817d5391e8f098d1cdf7b672f57713b289268a2d1e532f2fc7fec44339444205affb996e32b23c3162e2a539984be05bb20c4

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\MicrosoftEdgeUpdateComRegisterShell64.exe

                                    Filesize

                                    215KB

                                    MD5

                                    1d35f02c24d817cd9ae2b9bd75a4c135

                                    SHA1

                                    8e9a8fe8ca927f2b40f751f2f2b1e206f1d0905f

                                    SHA256

                                    0abf4f0fe0033a56ebdaff875b63cc083fd9c8628d2fb2ab5826d3c0c687b262

                                    SHA512

                                    17d8582c96b22372a6e1a925ccc75531f9bab75ebe651a513774a02021801d38e8f49b4e9679a9dfc53ccc29193fed18ab2e2935b9b7423605e63501028240e9

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\MicrosoftEdgeUpdateCore.exe

                                    Filesize

                                    262KB

                                    MD5

                                    e468fe744cbaebc00b08578f6c71fbc0

                                    SHA1

                                    2ae65aadb9ab82d190bdcb080e00ff9414e3c933

                                    SHA256

                                    7c75c35f4222e83088de98ba25595eb76013450fc959d7feefcab592d1c9839f

                                    SHA512

                                    184a6f2378463c3ccc0f491f4a12d6cac38b10a916c8525a27acd91f681eb8fb0be956fc4bdb99e5a6c7b76f871069f939c996e93a68ff0a6c305195a6049276

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\NOTICE.TXT

                                    Filesize

                                    4KB

                                    MD5

                                    6dd5bf0743f2366a0bdd37e302783bcd

                                    SHA1

                                    e5ff6e044c40c02b1fc78304804fe1f993fed2e6

                                    SHA256

                                    91d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5

                                    SHA512

                                    f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdate.dll

                                    Filesize

                                    2.1MB

                                    MD5

                                    b0da0a3975239134c6454035e5c3ed79

                                    SHA1

                                    fbea5c89ef828564f3d3640d38b8a9662c5260e6

                                    SHA256

                                    c590d1af571d75d85cfe6cb3d1aa0808c702bcefd1b74b93ea423676859fb8ba

                                    SHA512

                                    5fbfa431a855d634bcbef4c54e5cc62b6435629305efee11559f66473c427ad0775c09364d37aaa7a4a8a963800886f6547a52ae680a1ff2c4dcc52c87d994bb

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_af.dll

                                    Filesize

                                    29KB

                                    MD5

                                    c54dfe1257b6b4e1c6b65dabf464c9fa

                                    SHA1

                                    aef273340160af0470321e36e9c89e1a858e9d39

                                    SHA256

                                    0c426d4d48efff328a0da5497af24e83892a2ed1d6397a6dc42f9548a24dbff5

                                    SHA512

                                    58ae24dfc6045ce1f8ed782a03cb3d02c10b99a2992b9326711fb8700c8e7d05cfbca21e9b47cb4b1f4f806a9bb7667672026c715aad2f175febb6ba2b5f95db

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_am.dll

                                    Filesize

                                    24KB

                                    MD5

                                    ccdf8ae84e25f2df4df2c9dd61b94461

                                    SHA1

                                    64cd90b95a17d9ecf2a44afc0d83730b263ba5fe

                                    SHA256

                                    816c64b37e4c42cd418d05bc34a64e9c4acb4ce08b2a18ac5484374ca7b76e76

                                    SHA512

                                    242a8a93326d3a5ea1fd367ef6cc2b343f08f4ff68d88d91044d0ad7fce490f47524a6e57940991ff0893a590459e96c588944f2b115cee703413ca594046f7f

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_ar.dll

                                    Filesize

                                    26KB

                                    MD5

                                    3374d9bc4467dbdeaf50bbd5a26edcfa

                                    SHA1

                                    6d7bd73ad27148bad7488959d7ebea22b6805436

                                    SHA256

                                    5c8a8755cc0b1213fb0d5b57e10a53702f2091479d3c058d0c756134e548c685

                                    SHA512

                                    c0c02e54d7e0060b6ffa5bedf8d79cf4b40f77711680d2161b5186c5a8a10e521169dfa7ab6b8e4816c98e4aefd136f209a40c78104cb618c21105e095537719

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_as.dll

                                    Filesize

                                    29KB

                                    MD5

                                    87e596d8f0ac9fbe2d3176665eeb68f3

                                    SHA1

                                    1c9364d55b4844cd250504abe30dcff9792ee576

                                    SHA256

                                    c39669e004facfb0c500788747a4427fe26dcdb50ae695562e6e417f4eb190cd

                                    SHA512

                                    ef3708632e19332ddf460e081f8444ff8b4ec483c6b3e57f386df66d5f62d222b1d3f9f3728928701a6e48720133133c43619858853585a7d70b7bd5d8cf847e

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_az.dll

                                    Filesize

                                    29KB

                                    MD5

                                    ace0925ded0a4507d82e6d32a77c50df

                                    SHA1

                                    c760ff52c71de3080631120c6992dcd0ac4e37bd

                                    SHA256

                                    8e3c517bfc5986310c35f30b9681d9c919a7d62e299014410132ddc2b41f00b3

                                    SHA512

                                    8adec80e179f205d0571625c1a63a0188e6533adefd48691f2fc287a546c12249c2126e6958d1732fa8847492a8287723a0196fbc0f2b9af3c54e1ab418cc3e6

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_bg.dll

                                    Filesize

                                    29KB

                                    MD5

                                    aeb3a05ce4eecdef3d23dbc0094fe21f

                                    SHA1

                                    e2a5c49b4d0fddcad28649bd09d0cc7af4c0b2c8

                                    SHA256

                                    6c874a312ae57b8b0deac8457a200fcfc90aceaaa252628701c92aa8b9a823e8

                                    SHA512

                                    4a7fe6cf8300b394d7471d9a2d759ebed59690ce925270d6ceaa4e14ee06f01b67f8219559e9ec917477f4c5aae03329ae2c6e231f3fd41c645d02d26b29f367

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_bn-IN.dll

                                    Filesize

                                    29KB

                                    MD5

                                    afa21b2feee2831c5478e113ed814b76

                                    SHA1

                                    9e883c990a31b8cd0ed2f80f732f404386cc55d9

                                    SHA256

                                    183bcae9e143b78d04c2ed83ab6cac8cbd82f1d2bcf7bbb2506886a3925ac556

                                    SHA512

                                    294838c67f6d87fc3b4975c73d24e1c38173c8ad4a14c215945e9910ddc306e9deb0168f38661c85b5c77929fcbf56093f632a35c1b39181203fbd662d71f7f8

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_bn.dll

                                    Filesize

                                    29KB

                                    MD5

                                    8e0ff856270ca13f8c07825e39ae3613

                                    SHA1

                                    b351f8ae0cc13d97d201a268990b75fc9e6cd422

                                    SHA256

                                    18cd8ed69df17e1bcb517285caa88c8a73e093984fecbea2587e7144a8812a73

                                    SHA512

                                    25f3821c20aa222a28143951c9f370d3feceaf41e449f718640dce9af0e88e518bc40d2d02f5e64148d8909feedcfa6a8caf65a87ad12637a8bc13c848b1f178

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_bs.dll

                                    Filesize

                                    29KB

                                    MD5

                                    9f4c9469ef1930ec3ca02ea3b305e963

                                    SHA1

                                    e588ffdf150b55bb4ba38e2aaf175aaf6e1826d0

                                    SHA256

                                    fef14de38a4501cf538c89ca2d1ec389031124f69df9090df94fb4461e54ad58

                                    SHA512

                                    c166189ad76cb395a2aeea724f2088f42dd4d361518856166fb92b3335b8fc670e99eb7b1c4c9ac2c872c8283826cc2c88009bd975e690efbcc3d99289557e96

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_ca-Es-VALENCIA.dll

                                    Filesize

                                    30KB

                                    MD5

                                    2e9132ee071ca5653baf90b9b1ea382e

                                    SHA1

                                    8a0c1e5a0df6432c50539d68caf697b8adaf1556

                                    SHA256

                                    adf6e6542f1422c431ef92a209886224fbb53b5c67e68ac070d5c8a4c6ee569a

                                    SHA512

                                    0b021758117109e4414c7ef37356106a96b68536ade8d3f1d1fb3dfce7c1132ab6fe02f7292ed225c09814a9c57124f731fd35069d220760678eab565f320976

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_ca.dll

                                    Filesize

                                    30KB

                                    MD5

                                    917c18cfa84c8b8e83d8321f03be093b

                                    SHA1

                                    c0a4a743f4059183724fc8c26e84b5a80bb2f7f0

                                    SHA256

                                    6c56355b232c3bd35f397f99648c020733ea2d57db1cd4beafffcd962b896ae4

                                    SHA512

                                    03359c6104e9f0cb2d66b6f1bf5598b2bb00d9e7a62fbd0c5475ca67b5194e96c2e6053a2a1c22323ba0002c614caab0477597fd34b57dd1f5acdb19f70c0854

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_cs.dll

                                    Filesize

                                    28KB

                                    MD5

                                    8b49a989a56d4a5aabd0a03f179ed92e

                                    SHA1

                                    ca2f84217c867eb853830e95c7717ce35bd997f9

                                    SHA256

                                    849e23c2f53d06462bd0f38e9d7c98e9389486f526a90c461c04c0aa1db7b7be

                                    SHA512

                                    f4861ab9200db234550cd2e355ce200b7746c614e9c326287c0509d152f29d41d7a056e4fd27e3150cb433cd0234c4ae1cbc0c3a8b5892ecb3e8d4632a985aa7

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_cy.dll

                                    Filesize

                                    28KB

                                    MD5

                                    1146f59b139b9d810996a1bae978f214

                                    SHA1

                                    cc9d54e6e3ce1efc4ef851eba35222547b996937

                                    SHA256

                                    7b5ce6c7fa03e69a93694fa59c61be88b3eb8cd8951790f3bdd7cba2d99e6b83

                                    SHA512

                                    0c94943646b0a08662eda2d236b7c88ecec0745faff5b9c6097f68e73a20059f8d2de47a9c00e58c6d2083331a34a0fa19b0964f3c62a6b8cfa02bc1e283e75a

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_da.dll

                                    Filesize

                                    29KB

                                    MD5

                                    08fb61cf492ccd1236907af7a6b1bd4b

                                    SHA1

                                    9f6e0f7610d42f8a402d3adb7b66374f4d0f3cb5

                                    SHA256

                                    d6261d4bd9ce4011caee1e0efefb5685a5bb5e29130ad8639e4578fc90027631

                                    SHA512

                                    747982680ebc9e3c0993a69923c94382df6bfc113ebb76d31f65f9d824abef1a051a4e351f0f42296fd84e7663fc3bcc784da51dbce0554c3a880ac2258aa16c

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_de.dll

                                    Filesize

                                    31KB

                                    MD5

                                    970e46bfaca8f697e490e8c98a6f4174

                                    SHA1

                                    2bc396e8f49324dee9eb8cc49cdb61f5313130d9

                                    SHA256

                                    eeff2c2487c6456e6a3ed43fe5fbb9d3b72e301d3e23867b5d64f5941eb36dcb

                                    SHA512

                                    789f29ee2c34d86da5c69225bb8b2fd96273c20146126c28d3d36a880bbda5b16ace479ce59aafdf645328255105133f489278023e63e04e9fa1fb34cc1f3ae1

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_el.dll

                                    Filesize

                                    31KB

                                    MD5

                                    3d22a75afd81e507e133fe2d97388f2e

                                    SHA1

                                    f7f68cb6867d8c6386438d5a6e26539be493505b

                                    SHA256

                                    823fe6edc1fb0ebdfb8ebbaa2d36f6dc0424c8f26b6594a390ae0eaafd319ab0

                                    SHA512

                                    34a62ebe8d057a6f6e6f6b2672ebb95d4d7c49e739f4beee4bbfb5e917b7176aba4d70b0e84bd727c967d0885c08264dfb42371fe0d3fe4f8f12dbb1e26ca69a

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_en-GB.dll

                                    Filesize

                                    27KB

                                    MD5

                                    fe685e8edec8a3b3c16e7954b787e118

                                    SHA1

                                    ac71544158bf86d357d78d003f5ff2b4b5fd4ef3

                                    SHA256

                                    4b60ce6e3c8f725ad8e88cd0d0a3f0155a7145915670a532fe1143fb2dfbf49e

                                    SHA512

                                    e30d12a607d1c6fd2060ab38f443af680f8c8655900b0a21f3f0b488033f9300915667bdfa59ff4fd3488f58ac52c7f5598ff5078bf849bd177d1d8c10533f04

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_en.dll

                                    Filesize

                                    27KB

                                    MD5

                                    be845ba29484bdc95909f5253192c774

                                    SHA1

                                    70e17729024ab1e13328ac9821d495de1ac7d752

                                    SHA256

                                    28414cd85efe921a07537f8c84c0a98a2a85fdbd5dfa3141e722ed7b433d0a96

                                    SHA512

                                    2800ec29ece429151c4cd463c5042492ac24e82b4999a323607d142a6e1a08cb69258190a6722afbbcfb3c9cdc6eebdedf89ee6549e0f420f6fbae3aa0501fd4

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_es-419.dll

                                    Filesize

                                    29KB

                                    MD5

                                    dc8fcfbcd75867bae9dc28246afc9597

                                    SHA1

                                    8fd9361636303543044b2918811dbdab8c55866c

                                    SHA256

                                    3deb382ffdfbd2d96ff344ec4339f13703074f533241f98f0ccd8d3f8c98f4bd

                                    SHA512

                                    ac8fbf033677a6862f3d02cf93bf1838c24f006b40fd44336ae13ecc2287ae4c733cc3d601e39556586131e8a9e2d930814399ac68165a26458a6cbf51b11d32

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_es.dll

                                    Filesize

                                    29KB

                                    MD5

                                    9c0ef804e605832ba0728540b73558a7

                                    SHA1

                                    a305f6b43a3226120d3010ca8c77441f6a769131

                                    SHA256

                                    626835e07c1fc4ab670127682f3e5225881a2d4ddea873c5271e9032668fa641

                                    SHA512

                                    c27a4b24600bdd33a4f9430e8d4d8f7f3718efcaf2d1ec36023e34b996817af79b5a9baeea1506f97d2716c9b2b5509bbc1bf4d7cab779554eebadaa8c942dfe

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_et.dll

                                    Filesize

                                    28KB

                                    MD5

                                    111118683f6e8ed7ceb11166378aebb0

                                    SHA1

                                    fd3e1cf198885ab5d9082d540d58f983d8a0f5ff

                                    SHA256

                                    5cc4930c50716138e25987baacb9a9aed7d30ff5c0ac927e35f7fc006f5179c4

                                    SHA512

                                    cc3480f05d8d59d3d705204e15ff6453a6d9c77bdb1011d069bb1f83b3d4e14204f19caa7e7ecbb6e3ed92d429ac46940791903440fbfeca2f7e7e12b9a47f6c

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_eu.dll

                                    Filesize

                                    29KB

                                    MD5

                                    c0da1ad8854f64b7988d70c9db199d5f

                                    SHA1

                                    b184335283bf0026615f2a4a120fda87961c774b

                                    SHA256

                                    73190820d59e5bfe769b82ada48b0c9ed353524bd5cab303f5175d7d9bbb74ee

                                    SHA512

                                    424ef2d0ceaba76b64c3349ec1ff5088cb8aff9103fb38da238c80e6452a967f3dca09860b2b8fe9c01e20bebadc539960a5bc241a91bab98bfedf29c2f777ea

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_fa.dll

                                    Filesize

                                    28KB

                                    MD5

                                    c4cb44ee190c5aa8dd7749659437e5cc

                                    SHA1

                                    667f4aa01a4262fff2e01838f94330c0ebc285a2

                                    SHA256

                                    dc184d54d00d51d2f8de623c0c4b07e9408f7b02e1f1085107edaf14dcbee136

                                    SHA512

                                    0330d733e89811c4a89deb202ec517de3128ad266483f37bd8d91eb6e45336febf7297da4f3465c683ed1b6e08114d6a3f52ff74484276509b9816ae7dccbb10

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_fi.dll

                                    Filesize

                                    28KB

                                    MD5

                                    a9b037f7bc8f5b382bf6c69b993dbeb1

                                    SHA1

                                    7beb733f3561ac3083a3dfca3b7644c5154e1330

                                    SHA256

                                    b498d1b38a81199b62a98a0e36aa9e955e1c0143436908538314089c0e59d128

                                    SHA512

                                    a63c1e1a4d8d2e5043e0cdc420d1c545b0adbcdaa1a65f09454d47cc9642c1ffcb16e76454e90c75fd88f29917024b11418a606acbd560a98b79cd8631186332

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_fil.dll

                                    Filesize

                                    29KB

                                    MD5

                                    6b2319c3634103272f39fc71d7f95426

                                    SHA1

                                    a1d692a68c5cbb70d29a197ec32c9529c15a0473

                                    SHA256

                                    28c610ba7f8332be050c30e296acaee423bc0a7a9cacc7b3d60618e284ff9cfa

                                    SHA512

                                    51738dd14b410c689ed56530ac555824c773bcb163f4dbaddc86e684e04c1f06271001f0b2bef7d6231f17231b2e3e35f9aba2974c48eff6d1a8ab877e5a6031

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_fr-CA.dll

                                    Filesize

                                    30KB

                                    MD5

                                    8e1793233c6e05eeaf4fe3b0f0a4f67c

                                    SHA1

                                    97697fe9ba6b3cb5cfe87bb94587c724ed879c3b

                                    SHA256

                                    b9caaa668b71964316ee15e6e49f8ae81e5ed167fdb69fc31bc6df834ab4e7a5

                                    SHA512

                                    3d2fbf5e05e7b9e21c85ad7f59db9556046e4c1755f0b138d6de38eeadd3480e772e35798f9339aa7daffbf92afbc385f9c0bb4e4f5c65292dff3b280f52bd6f

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_fr.dll

                                    Filesize

                                    30KB

                                    MD5

                                    5e63ac4b5abe6c84f305898a0f9ba0bb

                                    SHA1

                                    e70baf6f175c297a9b491272ce8f131ba781553c

                                    SHA256

                                    711b5968d2116d7e97aa5852ec864db35d3c186f341fb024cd1ef4525256131a

                                    SHA512

                                    c383e4df4337bf9a66f684dabd2faa95cb49abb424c76d0603f91af7b7260be5b2877246da293d5df83fdb59d291d63a7d73303c34682a50ea84a8fcd7d6e874

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_ga.dll

                                    Filesize

                                    29KB

                                    MD5

                                    f7b123f6dd6c8d8832a8bb8b7831e42c

                                    SHA1

                                    7e9524b79036568b2b4446ee00c76460fb791c6d

                                    SHA256

                                    119b9e288832f2a4d47d63b693bb195a72f27e9c0aa014b2c3ccd5d185f7afc7

                                    SHA512

                                    6bd457d1e3f943a4ca5a1d36907fe526a4f2965a8411280a2988ef1d264203af0797365c1306e7ce103cabec2ead17d194f20848b4c665e986705c3ed6e291c9

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_gd.dll

                                    Filesize

                                    30KB

                                    MD5

                                    6de337fa9f131077042f7ce421a9fa42

                                    SHA1

                                    25e21b64cdf60a1da2f940b3c873eefd680a5fc9

                                    SHA256

                                    263e07308785bd7e510eda95499ab3d3d66942f0bfd0a5722258e2a87b5d0a90

                                    SHA512

                                    e747fc105c4ede0d4f73492e3757975a9410499caf867bc149cd43bdbf1be03d3df82fe04c7cf99e3ad6ee06fb5011fc5b069bd502c2f3b3e578f587d0362e3d

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_gl.dll

                                    Filesize

                                    29KB

                                    MD5

                                    be03945025cc2f68f8edd4e1ca3c32b7

                                    SHA1

                                    d4b1c83f6b72796377bfd3b42c55733eed8fc5e4

                                    SHA256

                                    aa95c108db3582a4be98fe83519aab3fed09c8cc9b326469edb89871d6562373

                                    SHA512

                                    a03656acfc123f06a071f0e326ce15bf17e2efe080fa276acd50cb40e35000d74a3d0762da327c59a7564bb3f03532bf04c733ae850852f62ce71fd513e9080a

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_gu.dll

                                    Filesize

                                    29KB

                                    MD5

                                    951dfd4709b3fdbe79a6e43828387592

                                    SHA1

                                    0c7bbf1852135456692970639869618fb616ba5e

                                    SHA256

                                    21c72dc48cd33291520e3f432d8d59ec103496ab6508f41fa1b081b3bdf98bb8

                                    SHA512

                                    b338c345db00135ceb3577a67bcbc36b37be742e39aa6a333bac93ba20ab1463df55a381be95c9e9effaed4daa0ce93203ff2994459f9a23813dc0afdff03e8d

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_hi.dll

                                    Filesize

                                    29KB

                                    MD5

                                    6b97796e1746317567ed7cffe9441d3b

                                    SHA1

                                    dd269b22021eb37fe854ff181a09bf7f9568f7ac

                                    SHA256

                                    a4ce75f6b1de6a2500bfd6b0ebc1c268cb3d7080dc9e7661bedd9361f7215d42

                                    SHA512

                                    f1856ac881de7acb7f61f2d7c1d064458855c3621fcfa951f1d1207f3d85fd6f64b26547ea1391c4145bdeee23e6611acb2fe80b8c1258dd108085e371d34d73

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_hr.dll

                                    Filesize

                                    29KB

                                    MD5

                                    8bbd58f9644187747407b0a18c60aa0a

                                    SHA1

                                    82888f3f2ce1dd7b9b3f5ac26bed0a6da5601dff

                                    SHA256

                                    35008c4ea7f22ac78d28e72311d4b3fa28d6af24072fa94558a9b3771a4b545e

                                    SHA512

                                    1fa7d62692062c1d22e3fe0e5c15bfbb2def115be2991001a998fcc6bbb5983d9343b06172e8f38b245587b15762b655ef58ec508160b576779963e5889efca8

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_hu.dll

                                    Filesize

                                    29KB

                                    MD5

                                    e56f98d6b32f82f391d5b087a135a7ec

                                    SHA1

                                    c8de62b4b22a8153cb788e03f7e04c55a5ae5396

                                    SHA256

                                    236252a34d2efdb4e801bd827a791935aadfe6c0a471f1b252d9bf2d291a6bae

                                    SHA512

                                    45b9933478505759e7217a65e3a054885841c5ae9bc58983c6cb216ea2a15c53f45ecfb6b40fee07d54c289819ddc2161a651e5183e244e0f43946176f224c8a

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_id.dll

                                    Filesize

                                    28KB

                                    MD5

                                    5b5366c7779dc9ce9f3a15b6f22289ac

                                    SHA1

                                    d9995fee337b9696be970a2a48a845ed71bd7d2b

                                    SHA256

                                    da6d5c982387286396f54c043bacf106f78fc76db4a33984c8b2cb88882fc9b3

                                    SHA512

                                    35362a3719833449bd9e757194f9b0b28c3d68a0c62f52d224b1cd5eca5a2343e1db868668e2b30d927a1966b5db5cd0b2230d7f4576627e486eb3a86913b195

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_is.dll

                                    Filesize

                                    28KB

                                    MD5

                                    b675cc1f6f5f174c265c0887d9591915

                                    SHA1

                                    abb182cfbe1d5723ecc380c5fa08b24c1f421af1

                                    SHA256

                                    c012110ad65f8244494ef2aa70696128a949fbc5797e5139afa7d4195457df1f

                                    SHA512

                                    be1b23a563a2b4f6b658df3f8075d48bf3921c5951a6fbe77c24a0949997e068403f5bcaa3f93030b01d7a69b1aa74ce06f37038c30145e03a9822f4854f7c0d

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_it.dll

                                    Filesize

                                    30KB

                                    MD5

                                    b8b03be1e73e1ccc0df159c48e875038

                                    SHA1

                                    37d1b2216f1e90a69b1be65b2c4f0f5f35e78aef

                                    SHA256

                                    4ee8f48af5136fb80f5d031395f92abb2b3571fdf7c4c98ae833c2ee74c49160

                                    SHA512

                                    ef47c8c0f8aed7a4d912986e2a3fbc34b54fdea25b006bcb63d502a6cefc42bca717a93e16ff1c137892a91b894ea15d95a53dd3b52b850bf1a75ec9bd7b3013

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_iw.dll

                                    Filesize

                                    25KB

                                    MD5

                                    dede65e2268976ded6f598ecea661025

                                    SHA1

                                    45c6fd614dac74eecf83709081b4f289c05271dd

                                    SHA256

                                    9379736bb1b621367e42736d311288d33742a9e0ca3e056b4638491fc434a880

                                    SHA512

                                    92a46ca5e3c40bf55fede64aecd7fd05f6419c645d38325546c46632775fe72cff4152e473ffbc15d478da62c76a088ebfb4db91b9a0691a9ce1c763ad3f9285

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_ja.dll

                                    Filesize

                                    24KB

                                    MD5

                                    ffc1ff9f4cb8fcb529f8580d3b92a80c

                                    SHA1

                                    d0ef21a7407c5eebe1fc21b6549c92c6222bf0cd

                                    SHA256

                                    d508f613bbec62a237a5616959dbc292fe4a79adc8783fb91725f3f2c32658d2

                                    SHA512

                                    6345362f03f3bc4409c1e5875b2e7cb58b5df9737c9c5502a19314046281e682a3ea7ac5adbbb933a130f52efad4da4eb9ad99ebfdd41bdba23d1fbea4180475

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_ka.dll

                                    Filesize

                                    29KB

                                    MD5

                                    e802f3589731c88d166a8b0e3bae1dc7

                                    SHA1

                                    b94e21b646c26053c19a0e6238f0e4fbde0a2fa6

                                    SHA256

                                    173f78b786cd1a58a47ec9f7c662e403b191fa42cb7308aa7eb6b0f744bfae0b

                                    SHA512

                                    ecf9eb33afb00c6839d6778e36685b904267e6f384a7d307230000a506e6ac6e95132c2f50a4cbe523d834dd6c7ecd1277d47b73188130e097a0b64c0ec64a51

                                  • C:\Program Files (x86)\Microsoft\Temp\EUA3C.tmp\msedgeupdateres_kk.dll

                                    Filesize

                                    28KB

                                    MD5

                                    1c6f35c21ff0afb2f4aa9d4352fc86f2

                                    SHA1

                                    d4bf67c14304add3e7d8218ff66a520a7b1e0a6e

                                    SHA256

                                    779900e90b23d0443e0b93b4ac7c8fa24dd6a0ebddb36cd22bcd7a1a6fce2ecc

                                    SHA512

                                    caf80f4adab14a81bb14e36683772539a6789448ddfcaba2a09e5c6c3e2dae105ce436ca7dd7b412c6c73dcc0768141822b13064d452a48a37721e1e9dd357f2

                                  • C:\Program Files\MsEdgeCrashpad\settings.dat

                                    Filesize

                                    280B

                                    MD5

                                    14f2e495b4a38d1db99e64d5ed42e909

                                    SHA1

                                    eff8bf64e507c3d3b40052c401a59d7b9e692dcf

                                    SHA256

                                    e69cf0c552d2c1dcc51be9d72fd11e10b58dd37799c17999d6a7c972cd5f93fa

                                    SHA512

                                    82caf75abba288d8220489fbd11b6ebc66a6f75b1dd960b055d9d0af6fb4e49e98ae22d5d5e509af97ad01ca949a4c6213d15e3fd8365634ebaca29a07a45c78

                                  • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                    Filesize

                                    180KB

                                    MD5

                                    19a2918a5f0c0a4a4276b4d672766dc2

                                    SHA1

                                    2cade805405734aa88b06f9cf59c76cb20018c8b

                                    SHA256

                                    9dc3d07fa50dc28f4a71b682ee44a4f4e07486e5899d565d75143aa3e17b4754

                                    SHA512

                                    c2b89af19df70de6893d2fd66edd1160090779d0f9b00642e4e5bf47fef7d4f340b9013eaaeb63a98ec5724794445f2068510553be6e0b1c3067c67d620a700b

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    ecf7ca53c80b5245e35839009d12f866

                                    SHA1

                                    a7af77cf31d410708ebd35a232a80bddfb0615bb

                                    SHA256

                                    882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687

                                    SHA512

                                    706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                    Filesize

                                    152B

                                    MD5

                                    4dd2754d1bea40445984d65abee82b21

                                    SHA1

                                    4b6a5658bae9a784a370a115fbb4a12e92bd3390

                                    SHA256

                                    183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d

                                    SHA512

                                    92d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                    Filesize

                                    265B

                                    MD5

                                    f5cd008cf465804d0e6f39a8d81f9a2d

                                    SHA1

                                    6b2907356472ed4a719e5675cc08969f30adc855

                                    SHA256

                                    fcea95cc39dc6c2a925f5aed739dbedaa405ee4ce127f535fcf1c751b2b8fb5d

                                    SHA512

                                    dc97034546a4c94bdaa6f644b5cfd1e477209de9a03a5b02a360c254a406c1d647d6f90860f385e27387b35631c41f0886cb543ede9116436941b9af6cd3285d

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    b7152aa55c642b5272d0835a417783b4

                                    SHA1

                                    7358d7c14dc95df9ed842e565bd35fb73f659721

                                    SHA256

                                    6e89b94aac66805bfb60210b3756bb86338ce4bfabe3493c19930241bf8bf045

                                    SHA512

                                    cc79eadb44b6a674f0d0680ca4669d7e0346c244fcafb5cf299b64a7d70b1442dea787dc19270d1f78d9fc5f95f677f0734c0f17fc62a92284b9830e8012b2e1

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                    Filesize

                                    5KB

                                    MD5

                                    32ccb6854a1a6699a83c6b2c9885e16c

                                    SHA1

                                    040337f45e919552c73a70a77c2cdc74b0378191

                                    SHA256

                                    ea27b7ea1f8fe693bf903960b5ce0f7630b62332a03df2aa32eb36bfefc7837c

                                    SHA512

                                    e4e909139df64f15f1d0ec71d3175b17b084cf4e749aac77b39cb8f704581846e9cd592c764eab4aa7fffdc72aec3050cdd20b7b406316b6bb3158191f30798d

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    6752a1d65b201c13b62ea44016eb221f

                                    SHA1

                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                    SHA256

                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                    SHA512

                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                    Filesize

                                    10KB

                                    MD5

                                    e0bb1e6dd69f65cde042bab7bc3fa334

                                    SHA1

                                    bb0835f3226912dc385bd838e384466ba160fb56

                                    SHA256

                                    5ff45d6e4bbf49e34f169c647c7ec7d0e267a3a9efabf3b47f3ea819b772cadf

                                    SHA512

                                    77babe2051013a78ae0314ae7fba5c80fa1dd56a047bc65cce975ac07b6bbd88709db36523144503a10964b4640686746761368ecc174234f8d60b135d5370c6

                                  • C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe

                                    Filesize

                                    1.6MB

                                    MD5

                                    d2ebd82a5d3fac11d44d90d8df253bb9

                                    SHA1

                                    ba94b456e111ea9573fe150ad4090a66540c9938

                                    SHA256

                                    04b65aa7b23d0c7ebbd6e022a600fbc43c0ee896ed280e48ac59e17fb0a2311d

                                    SHA512

                                    49e9ef8066200cd6ec079943c1fbcda95cab2d3042f635ed57949e0c0701ecdf34ea8f16324994dc77bc3ec9fc67882ea88b4d543974e90bf4e8cf69b15e073c

                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_lyo1asyb.z2x.ps1

                                    Filesize

                                    60B

                                    MD5

                                    d17fe0a3f47be24a6453e9ef58c94641

                                    SHA1

                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                    SHA256

                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                    SHA512

                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                  • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Crashpad\settings.dat

                                    Filesize

                                    280B

                                    MD5

                                    52f1e3d7943918d8954af4ee0548e196

                                    SHA1

                                    7c968f2fcc58df1a638a1f5e37e40ecf66921880

                                    SHA256

                                    5192694865a70db2e9fa722007e4c65092cdb22389cd9c45f4ea3513b0c09182

                                    SHA512

                                    377597f1db892c9106696ce2a58963fd9029b621592c857a8e4ce0ae855efe890c6147b639ec501094721950766bf4b7c7d13e13c2192647df45760b2fbb36f1

                                  • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index

                                    Filesize

                                    96B

                                    MD5

                                    d7f98698d32365d75827fdc6f943e378

                                    SHA1

                                    c0c14060c679f91e677564411388efdf5574c0ff

                                    SHA256

                                    c4d0e02061cd565c68bd2e03d239b839f0a8cbbe706f963469ceba93c222d016

                                    SHA512

                                    d7274145596b8d5df35e96997e7a0b6bed6ca97115c935ccbf95a148717577b196127e774286c185f56e763a4e63ac8a4ce6381459cfc030bbdd78777d0f5bf2

                                  • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index~RFe599b5c.TMP

                                    Filesize

                                    48B

                                    MD5

                                    b76504b2f4e38c1df64dbdb138018d58

                                    SHA1

                                    f3e316e614fcc34ce9b753697f459a16a7e0198f

                                    SHA256

                                    2f73fc59b06543e7f9b5a9af0edd31f7e301a5d881783361eb6e03f99d4648c7

                                    SHA512

                                    b8eb7ee9e320ea3b825897c63de7e1136d88895f41fdc91423be568b861c5a94c190c5541a59a21c1a5b7290024aa7f91e829f08555ddca5e58a8c4e87f707d0

                                  • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Default\Network\33d710ef-53cb-4e0e-a72a-c4826c474615.tmp

                                    Filesize

                                    2B

                                    MD5

                                    d751713988987e9331980363e24189ce

                                    SHA1

                                    97d170e1550eee4afc0af065b78cda302a97674c

                                    SHA256

                                    4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                    SHA512

                                    b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                  • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Default\Preferences

                                    Filesize

                                    6KB

                                    MD5

                                    137d8fa3dacbdf7588b9a5e3351a7cfa

                                    SHA1

                                    9f76ab18d90fba2ee3001b6a37015ffe60de2b6d

                                    SHA256

                                    960235d0b3660f3fad6c96c8ba90bd736e8d982b3768a2541fbd7dac9e5320bb

                                    SHA512

                                    76bb0276c547517a5fd902edab5e0ee2e8e299f09010e1cd7a6f652faf081387e3576c55b3488826111082ec96f07b55c0dad740da3dc047a209a7c9850abd63

                                  • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Default\Preferences~RFe59a81d.TMP

                                    Filesize

                                    6KB

                                    MD5

                                    7876a3c283c0abf9d4e8d47c5eb441ad

                                    SHA1

                                    887c0210907d76f202556bad005f031562379a96

                                    SHA256

                                    bd17b9594517c2db1775e6e7a8d96d2012cc016c855ea7b6e916397cafe5d850

                                    SHA512

                                    16f4fdf340f7dfcb034430f6f4791485303bb08b4b06f9f920ea57a51d6cd359de4702b632c14ded4830237651b138d8e5f32dace27dba594e6bd2dcc56ff503

                                  • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Default\Sync Data\LevelDB\CURRENT

                                    Filesize

                                    16B

                                    MD5

                                    46295cac801e5d4857d09837238a6394

                                    SHA1

                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                    SHA256

                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                    SHA512

                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                  • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Default\Sync Data\LevelDB\MANIFEST-000001

                                    Filesize

                                    41B

                                    MD5

                                    5af87dfd673ba2115e2fcf5cfdb727ab

                                    SHA1

                                    d5b5bbf396dc291274584ef71f444f420b6056f1

                                    SHA256

                                    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                    SHA512

                                    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                  • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\GrShaderCache\data_0

                                    Filesize

                                    8KB

                                    MD5

                                    cf89d16bb9107c631daabf0c0ee58efb

                                    SHA1

                                    3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                    SHA256

                                    d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                    SHA512

                                    8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                  • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\GrShaderCache\data_1

                                    Filesize

                                    264KB

                                    MD5

                                    d0d388f3865d0523e451d6ba0be34cc4

                                    SHA1

                                    8571c6a52aacc2747c048e3419e5657b74612995

                                    SHA256

                                    902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                                    SHA512

                                    376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                                  • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\GrShaderCache\data_2

                                    Filesize

                                    8KB

                                    MD5

                                    0962291d6d367570bee5454721c17e11

                                    SHA1

                                    59d10a893ef321a706a9255176761366115bedcb

                                    SHA256

                                    ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                    SHA512

                                    f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                  • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\GraphiteDawnCache\data_3

                                    Filesize

                                    8KB

                                    MD5

                                    41876349cb12d6db992f1309f22df3f0

                                    SHA1

                                    5cf26b3420fc0302cd0a71e8d029739b8765be27

                                    SHA256

                                    e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                    SHA512

                                    e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                  • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Local State

                                    Filesize

                                    16KB

                                    MD5

                                    62ee66dfe680b0a2f5f4cd4c595164f8

                                    SHA1

                                    fd93513e26569fe6bf156f4d3e86548ed55d3076

                                    SHA256

                                    ad72b28dfe2a6d86596aa7836c0737885574b2250adc1c9ddc4f59c2a1a2ec4e

                                    SHA512

                                    d6072d808f626f747c89a8daf1e77f67dbba94db1a7a3da9d59f9114507467656eeccbdf0fbc2b2311d2e02c8f3aee82fba3ec4a404963c6ed7e6efec08b7b70

                                  • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Local State

                                    Filesize

                                    1KB

                                    MD5

                                    027284847d13585f97cca93b7bc91589

                                    SHA1

                                    de9b66086b71a8b0f8557c2626ff9bb217c48ba1

                                    SHA256

                                    d38b81b2a90462078077be94b7f8d1fe71936f4b17d43189db5a365f3a594750

                                    SHA512

                                    25edb492bbe1e6d81d3c985f8401577da46e8f01e14503d6ee9099ded9cc1101d29ceb0600c25412111e379bad691e0915afbe8aec7581e2ac8bbc4566274699

                                  • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Local State

                                    Filesize

                                    2KB

                                    MD5

                                    8412b700fe3eb879425c5563363c511a

                                    SHA1

                                    6db81d1f619f94b7d6d06ba2e299531cd98172fd

                                    SHA256

                                    9b2760b7ebf4b108d31e03f83b80ba17a9a5110639c50bd26ba43e83418ea897

                                    SHA512

                                    e59a6fdd418fb237b46821e30a32901983b8bc24e6254d4c6c0ccc7694be59304fd3144ed4a750018e67cd53e8bd0e0fdc0b54634d27766cecd95f3c1ff794eb

                                  • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Local State

                                    Filesize

                                    3KB

                                    MD5

                                    4fc74cd2744d2f56b0fd48bd14d6d6da

                                    SHA1

                                    d07175cf71a7708162e16b39d4638b6f35ea04a9

                                    SHA256

                                    fc5d0216cc3e980cf2ddd2291a001385bd229892cf080a4cebab5ff19e06d392

                                    SHA512

                                    2821fe53bbab80e66ddfa9ad3da39a6d7845989b5508e2f737be567239871f4d769d0ebed01fdfb709de042f5b44fbac73679924c7ba68558937209b73d3b5d7

                                  • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Local State

                                    Filesize

                                    16KB

                                    MD5

                                    a1a18cc9cab4652e6365ce5a18f439e0

                                    SHA1

                                    4bdf8a8a2f79d888941e2ffc060ae25cccb68016

                                    SHA256

                                    bd8bd9a70e758a71389ea3559e53b0c1ed5e870527552e8bbc4c969d6f1fb2f5

                                    SHA512

                                    6404d29603ee2bfed951870cda406bb0d60ce7d75828ccf1a1e26501d8c73b2ea13c13fe998a2aca96b9865f5bd2ac1c866ffd02063b407f725fc95496440f8b

                                  • C:\Users\Admin\AppData\Roaming\myproject.exe\EBWebView\Local State~RFe5947dd.TMP

                                    Filesize

                                    1KB

                                    MD5

                                    57ed026be33f4e0afc4aacaf62364f66

                                    SHA1

                                    8f8714f6c61b0795d0188674a15fc8674f9b4297

                                    SHA256

                                    1464d08a972260acdfc01f58ed8f04c893a4f0c25ba16b53252bb552d839f3a6

                                    SHA512

                                    ca8333458c8906e6d180515851526c58306a59dc4de62edfe89edd88fa412f8472f41c46b7889ffb91704d79065cfc91c197d8283f8d6d50f0122c02e6039920

                                  • C:\Users\Admin\Downloads\Unconfirmed 838683.crdownload

                                    Filesize

                                    16.2MB

                                    MD5

                                    1baf851f46a5ea24e21ebd492d6b745c

                                    SHA1

                                    308f821d54bdc34d51c0ab69353fdb7f013cf19b

                                    SHA256

                                    3f86aac3627bc0050d3c823a3195f6c192f5fb15e080442c1f910453163078c2

                                    SHA512

                                    14d4b66272b63293b94a481e138efdec8c399628b40f4ff6137b107c7f38f0b00a71c4471e39428c13ab1b40cff76675cf26c7db4adb3d1f443a92947c188bae

                                  • \??\pipe\LOCAL\crashpad_396_JNDFYPPVNQWGCBUA

                                    MD5

                                    d41d8cd98f00b204e9800998ecf8427e

                                    SHA1

                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                    SHA256

                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                    SHA512

                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                  • memory/1372-254-0x000001D4E3340000-0x000001D4E3341000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1372-252-0x000001D4E3340000-0x000001D4E3341000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1372-259-0x000001D4E3340000-0x000001D4E3341000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1372-260-0x000001D4E3340000-0x000001D4E3341000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1372-253-0x000001D4E3340000-0x000001D4E3341000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1372-261-0x000001D4E3340000-0x000001D4E3341000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1372-262-0x000001D4E3340000-0x000001D4E3341000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1372-263-0x000001D4E3340000-0x000001D4E3341000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1372-264-0x000001D4E3340000-0x000001D4E3341000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1372-258-0x000001D4E3340000-0x000001D4E3341000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/1780-718-0x0000000000610000-0x000000000068E000-memory.dmp

                                    Filesize

                                    504KB

                                  • memory/1796-491-0x00007FF8FCF40000-0x00007FF8FCF41000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/3764-572-0x00000196EADA0000-0x00000196EADCB000-memory.dmp

                                    Filesize

                                    172KB

                                  • memory/3764-396-0x00007FF8FCF40000-0x00007FF8FCF41000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4512-443-0x00007FF8FC6D0000-0x00007FF8FC6D1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4512-444-0x00007FF8FD0A0000-0x00007FF8FD0A1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/5576-518-0x000001ADEF9A0000-0x000001ADEF9C2000-memory.dmp

                                    Filesize

                                    136KB

                                  • memory/5736-358-0x0000000000040000-0x0000000000075000-memory.dmp

                                    Filesize

                                    212KB

                                  • memory/5736-251-0x0000000074870000-0x0000000074A95000-memory.dmp

                                    Filesize

                                    2.1MB

                                  • memory/5736-250-0x0000000000040000-0x0000000000075000-memory.dmp

                                    Filesize

                                    212KB

                                  • memory/5736-326-0x0000000074870000-0x0000000074A95000-memory.dmp

                                    Filesize

                                    2.1MB