Analysis

  • max time kernel
    995s
  • max time network
    964s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-10-2024 16:18

General

Malware Config

Extracted

Family

mercurialgrabber

C2

https://discord.com/api/webhooks/1296143022274252902/VR_p1ujI-KCTmHxoF_avcaCTTA3fBe0ETAXKGFczt0ppDAyQLdnBIJma-soe52T6qVlJ

Signatures

  • Mercurial Grabber Stealer

    Mercurial Grabber is an open source stealer targeting Chrome, Discord and some game clients as well as generic system information.

  • Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
  • Downloads MZ/PE file
  • Looks for VMWare Tools registry key 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 7 IoCs
  • Loads dropped DLL 1 IoCs
  • Obfuscated with Agile.Net obfuscator 11 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 11 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 1 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 7 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 2 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 40 IoCs
  • Suspicious use of SetWindowsHookEx 19 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://gofile.io/d/SQ6xPv
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4452
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9840e46f8,0x7ff9840e4708,0x7ff9840e4718
      2⤵
        PID:888
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:2
        2⤵
          PID:4260
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2508 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1580
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:8
          2⤵
            PID:3076
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:1
            2⤵
              PID:3344
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3500 /prefetch:1
              2⤵
                PID:456
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:1
                2⤵
                  PID:1300
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:1
                  2⤵
                    PID:4396
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 /prefetch:8
                    2⤵
                      PID:4332
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4728 /prefetch:8
                      2⤵
                      • Suspicious behavior: EnumeratesProcesses
                      PID:5064
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4756 /prefetch:8
                      2⤵
                        PID:1716
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:1
                        2⤵
                          PID:1848
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5760 /prefetch:8
                          2⤵
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4896
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:1
                          2⤵
                            PID:2560
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:1
                            2⤵
                              PID:1472
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6268 /prefetch:1
                              2⤵
                                PID:5280
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:1
                                2⤵
                                  PID:5384
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:1
                                  2⤵
                                    PID:5464
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6268 /prefetch:1
                                    2⤵
                                      PID:5808
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6376 /prefetch:1
                                      2⤵
                                        PID:5944
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6364 /prefetch:8
                                        2⤵
                                          PID:6032
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6600 /prefetch:1
                                          2⤵
                                            PID:5152
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6640 /prefetch:1
                                            2⤵
                                              PID:5160
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6120 /prefetch:1
                                              2⤵
                                                PID:5300
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6348 /prefetch:1
                                                2⤵
                                                  PID:5312
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6064 /prefetch:8
                                                  2⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:5632
                                                • C:\Users\Admin\Downloads\winrar-x64-701.exe
                                                  "C:\Users\Admin\Downloads\winrar-x64-701.exe"
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:5740
                                                • C:\Users\Admin\Downloads\winrar-x64-701.exe
                                                  "C:\Users\Admin\Downloads\winrar-x64-701.exe"
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3764
                                                • C:\Users\Admin\Downloads\winrar-x64-701.exe
                                                  "C:\Users\Admin\Downloads\winrar-x64-701.exe"
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:5000
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6184 /prefetch:1
                                                  2⤵
                                                    PID:5788
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6252 /prefetch:1
                                                    2⤵
                                                      PID:5660
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:1
                                                      2⤵
                                                        PID:5296
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:1
                                                        2⤵
                                                          PID:5516
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6248 /prefetch:1
                                                          2⤵
                                                            PID:5136
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:1
                                                            2⤵
                                                              PID:3872
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4876 /prefetch:8
                                                              2⤵
                                                                PID:3184
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6436 /prefetch:8
                                                                2⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:6120
                                                              • C:\Users\Admin\Downloads\7z2408-x64.exe
                                                                "C:\Users\Admin\Downloads\7z2408-x64.exe"
                                                                2⤵
                                                                • Executes dropped EXE
                                                                • Drops file in Program Files directory
                                                                • System Location Discovery: System Language Discovery
                                                                • Modifies registry class
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:5348
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2720 /prefetch:2
                                                                2⤵
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:1272
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2184 /prefetch:1
                                                                2⤵
                                                                  PID:4632
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6708 /prefetch:1
                                                                  2⤵
                                                                    PID:2024
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3096 /prefetch:1
                                                                    2⤵
                                                                      PID:2892
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:1
                                                                      2⤵
                                                                        PID:780
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:1
                                                                        2⤵
                                                                          PID:4172
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6660 /prefetch:1
                                                                          2⤵
                                                                            PID:100
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=2108,6294044373309415750,12336325015209639060,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 /prefetch:8
                                                                            2⤵
                                                                            • Modifies registry class
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious behavior: GetForegroundWindowSpam
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:3228
                                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                          1⤵
                                                                            PID:5108
                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                            1⤵
                                                                              PID:4888
                                                                            • C:\Windows\System32\rundll32.exe
                                                                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                              1⤵
                                                                                PID:3200
                                                                              • C:\Windows\system32\werfault.exe
                                                                                werfault.exe /h /shared Global\85033c1570304a719038cb5bc306ad62 /t 5396 /p 5740
                                                                                1⤵
                                                                                  PID:2380
                                                                                • C:\Windows\system32\werfault.exe
                                                                                  werfault.exe /h /shared Global\c8277a34b4554fb387c4cf84c771b4a2 /t 5648 /p 5000
                                                                                  1⤵
                                                                                    PID:900
                                                                                  • C:\Windows\system32\werfault.exe
                                                                                    werfault.exe /h /shared Global\a73a49604dba4a009f5a59ccc8ab20ae /t 5676 /p 3764
                                                                                    1⤵
                                                                                      PID:5912
                                                                                    • C:\Windows\system32\mspaint.exe
                                                                                      "C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Downloads\UpdateRestore.png" /ForceBootstrapPaint3D
                                                                                      1⤵
                                                                                      • Modifies registry class
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:4500
                                                                                    • C:\Windows\System32\svchost.exe
                                                                                      C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
                                                                                      1⤵
                                                                                      • Drops file in System32 directory
                                                                                      PID:3416
                                                                                    • C:\Windows\system32\OpenWith.exe
                                                                                      C:\Windows\system32\OpenWith.exe -Embedding
                                                                                      1⤵
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:5172
                                                                                    • C:\Windows\system32\OpenWith.exe
                                                                                      C:\Windows\system32\OpenWith.exe -Embedding
                                                                                      1⤵
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:5988
                                                                                    • C:\Windows\system32\OpenWith.exe
                                                                                      C:\Windows\system32\OpenWith.exe -Embedding
                                                                                      1⤵
                                                                                      • Modifies registry class
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:5232
                                                                                    • C:\Program Files\7-Zip\7zG.exe
                                                                                      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\Mercurial.Grabber.v1.03\" -spe -an -ai#7zMap27634:108:7zEvent32268
                                                                                      1⤵
                                                                                      • Executes dropped EXE
                                                                                      • Loads dropped DLL
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:6040
                                                                                    • C:\Windows\system32\NOTEPAD.EXE
                                                                                      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\Mercurial.Grabber.v1.03\gxsdg.txt
                                                                                      1⤵
                                                                                      • Opens file in notepad (likely ransom note)
                                                                                      PID:5904
                                                                                    • C:\Users\Admin\Downloads\Mercurial.Grabber.v1.03\Mercurial.exe
                                                                                      "C:\Users\Admin\Downloads\Mercurial.Grabber.v1.03\Mercurial.exe"
                                                                                      1⤵
                                                                                      • Executes dropped EXE
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:5908
                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\ayixpwjp\ayixpwjp.cmdline"
                                                                                        2⤵
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        PID:2388
                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
                                                                                          C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7CE2.tmp" "c:\Users\Admin\Downloads\Mercurial.Grabber.v1.03\CSC5BD1450B49F64D3CBDF733D517BC5B49.TMP"
                                                                                          3⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:1192
                                                                                    • C:\Users\Admin\Downloads\Mercurial.Grabber.v1.03\ImpactFixer.exe
                                                                                      "C:\Users\Admin\Downloads\Mercurial.Grabber.v1.03\ImpactFixer.exe"
                                                                                      1⤵
                                                                                      • Looks for VirtualBox Guest Additions in registry
                                                                                      • Looks for VMWare Tools registry key
                                                                                      • Checks BIOS information in registry
                                                                                      • Executes dropped EXE
                                                                                      • Adds Run key to start application
                                                                                      • Maps connected drives based on registry
                                                                                      • Checks SCSI registry key(s)
                                                                                      • Checks processor information in registry
                                                                                      • Enumerates system info in registry
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:3644

                                                                                    Network

                                                                                    MITRE ATT&CK Enterprise v15

                                                                                    Replay Monitor

                                                                                    Loading Replay Monitor...

                                                                                    Downloads

                                                                                    • C:\Program Files\7-Zip\7z.dll

                                                                                      Filesize

                                                                                      1.8MB

                                                                                      MD5

                                                                                      1143c4905bba16d8cc02c6ba8f37f365

                                                                                      SHA1

                                                                                      db38ac221275acd087cf87ebad393ef7f6e04656

                                                                                      SHA256

                                                                                      e79ddfb6319dbf9bac6382035d23597dad979db5e71a605d81a61ee817c1e812

                                                                                      SHA512

                                                                                      b918ae107c179d0b96c8fb14c2d5f019cad381ba4dcdc760c918dfcd5429d1c9fb6ce23f4648823a0449cb8a842af47f25ede425a4e37a7b67eb291ce8cce894

                                                                                    • C:\Program Files\7-Zip\7zG.exe

                                                                                      Filesize

                                                                                      692KB

                                                                                      MD5

                                                                                      4159ff3f09b72e504e25a5f3c7ed3a5b

                                                                                      SHA1

                                                                                      b79ab2c83803e1d6da1dcd902f41e45d6cd26346

                                                                                      SHA256

                                                                                      0163ec83208b4902a2846de998a915de1b9e72aba33d98d5c8a14a8fbf0f6101

                                                                                      SHA512

                                                                                      48f54f0ab96be620db392b4c459a49a0fa8fbe95b1c1b7df932de565cf5f77adfaae98ef1e5998f326172b5ae4ffa9896aeac0f7b98568fcde6f7b1480df4e2d

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                      Filesize

                                                                                      152B

                                                                                      MD5

                                                                                      1b9739f5776a018d1dfea64dee3f4897

                                                                                      SHA1

                                                                                      3dcea83f53d046c24318fb0748f4d0652b213456

                                                                                      SHA256

                                                                                      a667d0d19885a961de72e4ba4b89957e9904bb9ac99e878e7fc106da0b3091e0

                                                                                      SHA512

                                                                                      d22f0a192450d4185fe73674d0bde7f2fa1f68bcc16ade038c372028a891d230391e45d08c02db9d11b8fccc250abbc5a29ca3d7759dbab8cb937cb4066e46e8

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                      Filesize

                                                                                      152B

                                                                                      MD5

                                                                                      2c40d5d7c5e0a85321aa5a230e68a231

                                                                                      SHA1

                                                                                      c4ac788ba4da6897adc3c9ef661ca6b469fc547e

                                                                                      SHA256

                                                                                      9bc3a5bef04210d4751fd4ed395131776e8f7737a5a377be09fcddfb7eb45384

                                                                                      SHA512

                                                                                      bb513fae1e4dbaed4ae59181407a24fe987c642451e6546fbcf14555fae575ff2d227fc39dee997fd64407d2927973831bfa14645d675c041b2dfc61ed3d55c0

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000a

                                                                                      Filesize

                                                                                      62KB

                                                                                      MD5

                                                                                      c3c0eb5e044497577bec91b5970f6d30

                                                                                      SHA1

                                                                                      d833f81cf21f68d43ba64a6c28892945adc317a6

                                                                                      SHA256

                                                                                      eb48be34490ec9c4f9402b882166cd82cd317b51b2a49aae75cdf9ee035035eb

                                                                                      SHA512

                                                                                      83d3545a4ed9eed2d25f98c4c9f100ae0ac5e4bc8828dccadee38553b7633bb63222132df8ec09d32eb37d960accb76e7aab5719fc08cc0a4ef07b053f30cf38

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000b

                                                                                      Filesize

                                                                                      19KB

                                                                                      MD5

                                                                                      76a3f1e9a452564e0f8dce6c0ee111e8

                                                                                      SHA1

                                                                                      11c3d925cbc1a52d53584fd8606f8f713aa59114

                                                                                      SHA256

                                                                                      381396157ed5e8021dd8e660142b35eb71a63aecd33062a1103ce9c709c7632c

                                                                                      SHA512

                                                                                      a1156a907649d6f2c3f7256405d9d5c62a626b8d4cd717fa2f29d2fbe91092a2b3fdd0716f8f31e59708fe12274bc2dea6c9ae6a413ea290e70ddf921fe7f274

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000c

                                                                                      Filesize

                                                                                      63KB

                                                                                      MD5

                                                                                      710d7637cc7e21b62fd3efe6aba1fd27

                                                                                      SHA1

                                                                                      8645d6b137064c7b38e10c736724e17787db6cf3

                                                                                      SHA256

                                                                                      c0997474b99524325dfedb5c020436e7ea9f9c9a1a759ed6daf7bdd4890bdc2b

                                                                                      SHA512

                                                                                      19aa77bed3c441228789cf8f931ca6194cc8d4bc7bb85d892faf5eaeda67d22c8c3b066f8ceda8169177da95a1fe111bd3436ceeaf4c784bd2bf96617f4d0c44

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000d

                                                                                      Filesize

                                                                                      70KB

                                                                                      MD5

                                                                                      4308671e9d218f479c8810d2c04ea6c6

                                                                                      SHA1

                                                                                      dd3686818bc62f93c6ab0190ed611031f97fdfcf

                                                                                      SHA256

                                                                                      5addbdd4fe74ff8afc4ca92f35eb60778af623e4f8b5911323ab58a9beed6a9a

                                                                                      SHA512

                                                                                      5936b6465140968acb7ad7f7486c50980081482766002c35d493f0bdd1cc648712eebf30225b6b7e29f6f3123458451d71e62d9328f7e0d9889028bff66e2ad2

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000012

                                                                                      Filesize

                                                                                      40KB

                                                                                      MD5

                                                                                      3051c1e179d84292d3f84a1a0a112c80

                                                                                      SHA1

                                                                                      c11a63236373abfe574f2935a0e7024688b71ccb

                                                                                      SHA256

                                                                                      992cbdc768319cbd64c1ec740134deccbb990d29d7dccd5ecd5c49672fa98ea3

                                                                                      SHA512

                                                                                      df64e0f8c59b50bcffb523b6eab8fabf5f0c5c3d1abbfc6aa4831b4f6ce008320c66121dcedd124533867a9d5de83c424c5e9390bf0a95c8e641af6de74dabff

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000013

                                                                                      Filesize

                                                                                      53KB

                                                                                      MD5

                                                                                      68f0a51fa86985999964ee43de12cdd5

                                                                                      SHA1

                                                                                      bbfc7666be00c560b7394fa0b82b864237a99d8c

                                                                                      SHA256

                                                                                      f230c691e1525fac0191e2f4a1db36046306eb7d19808b7bf8227b7ed75e5a0f

                                                                                      SHA512

                                                                                      3049b9bd4160bfa702f2e2b6c1714c960d2c422e3481d3b6dd7006e65aa5075eed1dc9b8a2337e0501e9a7780a38718d298b2415cf30ec9e115a9360df5fa2a7

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      e02b782ef569197f7680813b29d6b9bd

                                                                                      SHA1

                                                                                      de007173b42d799a2f6801b0fbf0135f2ef5c7da

                                                                                      SHA256

                                                                                      01971a80f305dd68efef4c0e511fdaa449d0fa10eef438b7aa081843f5391b26

                                                                                      SHA512

                                                                                      9bcac2b2e14aad87631e7aed20b8d79f6e6801330ba9a0712af8c73bfda302204e27fda631ddd67645d03b32fc2bccbb4b522692ef1eb55a4c167434c9e20adb

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      d19056327212c18437d9dc8565567340

                                                                                      SHA1

                                                                                      b082ac776f8699603695316b2d16bffa043c755a

                                                                                      SHA256

                                                                                      6c7e5b19338cd250844b35941cd8b4b114a88ea6df2eaa0c5065b55d92955e52

                                                                                      SHA512

                                                                                      6c15e6a3c74c714072252281b8eb67da7a3e058debb57b87dfbe9226cc76d9a7aed598facdb74cd1428b22b55d3faada94ee874e295efb0bb071895dfe6aac23

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      8f659c799bfcf789cb2ff9b9983ff254

                                                                                      SHA1

                                                                                      83acbd2575ccb61f58a81cb7555fad33cb122a00

                                                                                      SHA256

                                                                                      ba4dc83fe71af5a52e10fb3dc1985c008000a56e01c9db8af25843a9ba18a319

                                                                                      SHA512

                                                                                      672b7f3c1cc7b814699f7389e7ff0ba6c4a9eccdf3b8d0a8c9b9e6a6a8abde76bda97f3e54d7911132fb4e9874493a1b49568bb88d94cb0e4883ef3a136efc05

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      e44423ab9538a4871c77470f3c3f5ea7

                                                                                      SHA1

                                                                                      eae05ddf2cd08610714736a7dd686822a062861f

                                                                                      SHA256

                                                                                      bd86fdb36044d922f767c55c74215567c9fa2933e36c334cbca602b347712a23

                                                                                      SHA512

                                                                                      ca1b48ef2655460bd312d604f4da7db660e07138a29b605798c720f58f866227f3f9ea2dd9717580bb88fab81bd051a72eb8d7b9e41bbb4af0005173a6baf9cf

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      5f64f84b77fcad5a242f1f302cb86587

                                                                                      SHA1

                                                                                      8601b4073208381d8ab941c840c650326f2448ca

                                                                                      SHA256

                                                                                      8aacd96c062785864b96ce19e9c604296e5d5956af845e9ee8318bb5bf91b5cd

                                                                                      SHA512

                                                                                      5499032cf17661c1fcf28d6f8e6616fc1ebc84fa3a2ada1eefc7544d5a772a5c3b1af29f47a121c1a2acc5f5dd3af2f80ceb0e6f4e22c5b8ce3914c9f7df0765

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                      Filesize

                                                                                      741B

                                                                                      MD5

                                                                                      dd11185b5d4867a0c10246db75ce6baf

                                                                                      SHA1

                                                                                      97ec68a3e70fb863b23567aae7821b2ffe5b9507

                                                                                      SHA256

                                                                                      5c7e3ffe2d39eec8188a33569c78bb6b9b4077967b9dced9c4f8e546bd00f8f4

                                                                                      SHA512

                                                                                      ff32c4e72f03293dd8757baa6fa950f1ec30c81e8e3c0f77a3370266aa166dbfd97ed2140587ee2498e79efc462c9b2a190ba9b37cdded060bbcd89fbaafb82e

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      7f50cb6705a8967d6337be5a55456609

                                                                                      SHA1

                                                                                      38471184b68355dc13961a568894944a1f752969

                                                                                      SHA256

                                                                                      1d2b6f02ff5e87a302ffdafb54ab0fd0f0c011eac6268eff704e92f6cbeefc99

                                                                                      SHA512

                                                                                      4a36e69d47862ff5a17823190eff9ad11671c0d34684dfeacc50f9ab775114158349385aa40e49cfc7d18d63df58bd163645a875830605eff8dd19e658c20b41

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      e982687f46061a9df52766774254a536

                                                                                      SHA1

                                                                                      79a3122721493be2bf7db739b7eefaca8ce90971

                                                                                      SHA256

                                                                                      df1e059ac375bf76e1af0003c171c9d11d08233f44da39eb3257498384907be2

                                                                                      SHA512

                                                                                      62fcd736ee38ee44dee92e3b1cf1213eb351884edc530a1ba0f3aa08ff8410d14d076676fb4193bd761ec342ca044136402a9687b4c8dba6223b3ec335ecf10e

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      4106c50422d4c39ad8ce7be569d9e5b1

                                                                                      SHA1

                                                                                      b105def0a1f15bf84c11ace923705e5fa9d94eec

                                                                                      SHA256

                                                                                      bba2e9081f82fa3f013e30daed2fe9126b4e0501782af953914880f36860c085

                                                                                      SHA512

                                                                                      087d1872eddf7aad7157c1f5056f8684fb0b5d5e06395d5049dac355f6e73441fddf9e95b75881e0ff58d8af267ab1e36e89fbbf5c04a8b7c8aa920ee65c34ac

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      6dfaf9d90d71e5459b73c6aad796ef79

                                                                                      SHA1

                                                                                      935bb7b0d71edbdcdbff68a4b783de8782ba0260

                                                                                      SHA256

                                                                                      c61598f2f6e67e4311043b2c205e73ed95af08515e408c77c280355b514f9304

                                                                                      SHA512

                                                                                      b6fa46c392ac3429e63f57fa3d64e1774c9865682a8c1d07dc9db5f0af6b84199d643edf13597adb266b391a82773660da973aed85416bfc4ba772e169e74fa8

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                      Filesize

                                                                                      7KB

                                                                                      MD5

                                                                                      d85cf4a5f326462c200cb06381dc9590

                                                                                      SHA1

                                                                                      5ab4c6ace56961f579b036ce8e16d996e9faec41

                                                                                      SHA256

                                                                                      600263b103b49570126fc9d976335d41ca46e3ce3f4390ebccfde76eec8d4c2f

                                                                                      SHA512

                                                                                      a1510e28fc16e4b9b52e9d9f6c865df25ebec5adf3a889e8a8e3c1364cb5ec32f450aa66f4c825747d9f37e3e4073556f2b91af84fcc5fbad66b874ad187b838

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                      Filesize

                                                                                      5KB

                                                                                      MD5

                                                                                      2c2432ec90b442bf73f7d461470f544c

                                                                                      SHA1

                                                                                      d810d0314a38c98959a2c798a93cf9e100016fe9

                                                                                      SHA256

                                                                                      191d412a1b1d866edad439dca6d2b7252d9785aba1a0af55d8ba2cb17aa80cb0

                                                                                      SHA512

                                                                                      e34fadff54ce6d0161ac107d40efeceed3f2ff6bd5821c59c5ff03e8f53861289c552e38fc11c9c0b33f72a26bf5fe53735697822b116745d835bf777b7eb7b2

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                      Filesize

                                                                                      6KB

                                                                                      MD5

                                                                                      1c6c1ec8c2445bb57d129a45fdf1ec8e

                                                                                      SHA1

                                                                                      8c438943d82c7592d9b506d809a0469d828976e8

                                                                                      SHA256

                                                                                      5b82e74a7d076f1f3a1222b39bde098a7ba18319c683cf2500a7886cb7ddcac3

                                                                                      SHA512

                                                                                      985b5b75245e9a4b9df7d70ecf0ffeb0f3264f3a821724aba9cadde00eccef4ac45e6b6f032cef44c4a70977ce77a7782f95dd62dda1ed2dbc030db511c824f5

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                      Filesize

                                                                                      7KB

                                                                                      MD5

                                                                                      906e1a482d473681d01c8e2021382d99

                                                                                      SHA1

                                                                                      b4b2e95ad2e83f4bd80b277be313b090bce17172

                                                                                      SHA256

                                                                                      df334e91cb639720a1e7bcdec38aaa81ded15da4298484413d31895c2dd00ef8

                                                                                      SHA512

                                                                                      d8e7f8a70dc7313ceb42d9df223a9ced19050e9beaaae9ed276be7caa333f2b08ee1ecedddee2142f8e498f6c5222c19e878344392e8cf75d64461e711ce9ded

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                      Filesize

                                                                                      7KB

                                                                                      MD5

                                                                                      d65328f17bca96fee7f26f50443b3fd0

                                                                                      SHA1

                                                                                      c72c9d4177a092d33a9b2357729fdd8df58eeb81

                                                                                      SHA256

                                                                                      98326ab44256e381b7ebda8729c4b51ea4be129e15baa537268ebd1e5fe82ca5

                                                                                      SHA512

                                                                                      d7207b1bb9b50806ea63c9a8dfa26ef7664ea7788ea94a60b1a676b5dc748503d8ae036563a79a7a9945826393450e70f40351dd28e1948c6fdd37713c472bf5

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                      Filesize

                                                                                      6KB

                                                                                      MD5

                                                                                      bcb31549c8d8bcfdbe092dd7bc3340c7

                                                                                      SHA1

                                                                                      d8d782d8eddc57253e4f6cfd0ebd08c7bc10650c

                                                                                      SHA256

                                                                                      b8062c45390df0327a9ee10fdc31611cdd8cdff2390c905631c711d28cfce165

                                                                                      SHA512

                                                                                      9b162c4f92861246438a84e2941dd18f44128c4349c9580522de14f08069df12a94c4417df30dc299feb096685a69f4f2b8341392c337c09aa10ccf779efd03e

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                      Filesize

                                                                                      6KB

                                                                                      MD5

                                                                                      d774215e52495b929e23e27368d2b7a1

                                                                                      SHA1

                                                                                      dcefb43d9fe9e637c7261b049549cf10f6c40cc2

                                                                                      SHA256

                                                                                      fc4eb14dab3910d40288b936d4a6ab9e0f2f49283cad3fef87da863aa01ebde9

                                                                                      SHA512

                                                                                      fc19dae39658c29442add7daf628718de6b5223ee2e48c5b8b4babf1ceb79f4eca5e150e9c0fb124fd4d7e8167050ab4fbd5decb0afa27e86c2a00bdb6a56da0

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                      Filesize

                                                                                      7KB

                                                                                      MD5

                                                                                      e44d6dd6b52b7ff91cfeda37f0127901

                                                                                      SHA1

                                                                                      59fa1a39d7246207620e7f2394ff11842459f8ba

                                                                                      SHA256

                                                                                      a0a0bbf78683952cd93092d9d4b3841e6b18997ecc6f286331a81b8fcee2a50d

                                                                                      SHA512

                                                                                      e958f14f18bcb689806f0398ed7424fcf65898a3b12132c17e1fb3df48ca47acf3a413549f713d67037f572c84f450e9884a0b068596c94ef8dd735ec8451c4e

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                      Filesize

                                                                                      24KB

                                                                                      MD5

                                                                                      62fa438b48fdfb61c360e6d4fd356110

                                                                                      SHA1

                                                                                      6e54e946a5211afa1459715b9f37a18ea92cdd57

                                                                                      SHA256

                                                                                      fe3d2e83848ede65097467a54ea813ed25a51119e87121089b3cfc531ebe5798

                                                                                      SHA512

                                                                                      01ada296a3fefe713f53d80d2c95b6e41231012d0998077b7948a68d961b61292d1e3b1b3457488eaa739fc4ff0974672ee448d29d2fcce2c1bebab49da96624

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      cf8b1adaa4e8f69c96883746a109e552

                                                                                      SHA1

                                                                                      ae4924e9c589e4827ae1ea2d254d77b2a18fc75a

                                                                                      SHA256

                                                                                      087af230e1d90415c07dcb2b4bb745ca1281484d2e8bdfb20348b5dcf5dcab38

                                                                                      SHA512

                                                                                      7a3bd68c3b9d3fa5e0688db1530f126ffd820a4d52df803373af6fe1cec6e52be4678c8429fea9788503e446d1a4d40f91f1d266ef4cea2d0b0c6ae3e448153b

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      328b3e546ec470e83d1bdf8db64f3db1

                                                                                      SHA1

                                                                                      903897a9ec9d10d4936fc0cb73d4aec52f9c7c43

                                                                                      SHA256

                                                                                      67504e5a09395eb38ba4a1ac24f86bfedb922efca24ba06136247e8a02e66d65

                                                                                      SHA512

                                                                                      695986ef1ed7bc802e108da578bbb5b1fe4ac3e5be5c56d192a89aa221ea6056b2b409a58ebbb400579181bb9fc1124ae136c3a13d508e4ae64ace89c454ac09

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      957a3e898930daf2476cf42728015710

                                                                                      SHA1

                                                                                      580c5fd64ed8b95be431c3dd8d7505a5920b8bd2

                                                                                      SHA256

                                                                                      a677a77130dc9f3deb4e7aa3834a610c6b778ce5d4961f649228cb8645c45c65

                                                                                      SHA512

                                                                                      e205e9df78623c8ffb644b54dc02433e49f7799b4d905a8ef93db94dc6a3688e5f21db8e9f93afbc8a16edb54b6ac76a814132119d7d769e65e8fa036dddada7

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      7f69187489055d252c80043eb1a0fa43

                                                                                      SHA1

                                                                                      c939d48cd708bdabd978becbba4256a011bd2516

                                                                                      SHA256

                                                                                      77e0da754ac41b7e793d69e4a7c2b10219e74729b5d70354fa037db7787595b6

                                                                                      SHA512

                                                                                      5f433acc8940c086874649e4c51b6998fe0f4aa06da91157ae5d9cfa40d26cbd480b6a32ab3796fc702556630de405690a1a460962002ee4be7fbe1e153f7901

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      3052d4603f0c8d29412e898abff2d44c

                                                                                      SHA1

                                                                                      6eb75dabe600b6c7f330e000608063c3ae371e5b

                                                                                      SHA256

                                                                                      54713bed80b0b6af210c979d94de7c7a5656c45742ea207663def05272372166

                                                                                      SHA512

                                                                                      2abd608dc1d8049c80b9b758741089c082984ee479d4281251afd34a13746a7dc5c719256315699832ca3a285da5243c2af0aae21f7d2ec19c53126452390b6a

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57ec92.TMP

                                                                                      Filesize

                                                                                      370B

                                                                                      MD5

                                                                                      8d2be5cd01f4989f9163db467ac19d99

                                                                                      SHA1

                                                                                      43a239421a8478b91a997e9d48b251f9d9ef9b3c

                                                                                      SHA256

                                                                                      fc56db29a4f7a67175a280e1bdf8d676d8f9a9bd5ab2988c17fd13de9c5d1033

                                                                                      SHA512

                                                                                      aef8e32388396afbcc5a466309c914b4f2b9dd1997bea6450ee550864e9c80cea7e593931e5c734689f064fa5e0c33b7314f9ae45a1cd157e4b4240c1af12813

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                      Filesize

                                                                                      16B

                                                                                      MD5

                                                                                      6752a1d65b201c13b62ea44016eb221f

                                                                                      SHA1

                                                                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                      SHA256

                                                                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                      SHA512

                                                                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                      Filesize

                                                                                      10KB

                                                                                      MD5

                                                                                      2f1e2f519b8aa29d03f4555224a19465

                                                                                      SHA1

                                                                                      4a6a2a792b012c3d43c05b344109534ad05a9a80

                                                                                      SHA256

                                                                                      868597dce21fb5318606d0e6ca83d605bcee31541a33a8a746018b2969d6c5ce

                                                                                      SHA512

                                                                                      46083c8dbf63bffe97ee84962cb1283bf414a182502e7999506475acf7d2cea6ae3f9899f8303118f2ef8dfd3328bb8712f481eead38ccf04c647c59e30d09db

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                      Filesize

                                                                                      10KB

                                                                                      MD5

                                                                                      91887f915b3d954af84c0f4412b1c62b

                                                                                      SHA1

                                                                                      b14ba780f89f5c36d725ece20242f7782f72d96e

                                                                                      SHA256

                                                                                      82d9d782752f56ab4575ffbb620aed8628e7f88c688e683b3ce69d13aaa8e113

                                                                                      SHA512

                                                                                      a1d9b36eae647f8b92917aa6346e9aa0cd62c749df38eeae5001436290aec7a21880170225f1f12573056b2df2b6bbc05539dabe861482861128ef9ab9667286

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                      Filesize

                                                                                      10KB

                                                                                      MD5

                                                                                      1c17176e08789497afe9233b1382ab9b

                                                                                      SHA1

                                                                                      34f8cf621c80aaaff6af4e4d656363af8c14f589

                                                                                      SHA256

                                                                                      1f479f4748055ef2da1b7fb384e168c1eb1ccf6cdf3564fbf8dc73cf266da19b

                                                                                      SHA512

                                                                                      4da6ce5ef82da6eb8119c19c7076204b6eb12c52dc10ef474c4b5a1944ac9180a402de1c3d448c6df977aabb2c2de60ed73a1ddda7a5bd93f2d115980ce513e8

                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                      Filesize

                                                                                      11KB

                                                                                      MD5

                                                                                      2af1b423651c1dbb769b9da5451568a2

                                                                                      SHA1

                                                                                      097bf491980930e36fc460de7c7777bea142b1e8

                                                                                      SHA256

                                                                                      3ef38861941c853935613c474d8d3ee9dbb97208d77050d1d5a97a0acbb77e4f

                                                                                      SHA512

                                                                                      e7db4be1f169878ba9468d5ef9479a273c176c76e2a6301a7192636e7eff16c5d7d4c110a22e3fa555885bbb52cb9046b5ea468b684a81d58806be2effce29a6

                                                                                    • C:\Users\Admin\AppData\Local\Temp\RES7CE2.tmp

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      ca08dbfac9f55ce5ac870f521a86aae2

                                                                                      SHA1

                                                                                      3d8b42b70f6f400a29078de047c4971e706a5486

                                                                                      SHA256

                                                                                      263d7240fe00d3f549569f9afb0dbfa16358864c30f34b551fe7a82f0446e387

                                                                                      SHA512

                                                                                      54a40e976663d2b75f059c9ea22684c7833c05d77f945e7b22ac6638da2f49d76480382cf75bd3160a67f73e3070a2fee51498cdb0acede2e873fb8a6392a722

                                                                                    • C:\Users\Admin\Downloads\Mercurial.Grabber.v1.03.rar

                                                                                      Filesize

                                                                                      2.9MB

                                                                                      MD5

                                                                                      0241a4427fe090d4b229672a18246f3d

                                                                                      SHA1

                                                                                      738370ae4da542616d06c57db37be9d0140713ac

                                                                                      SHA256

                                                                                      34d4a51fad3a8c47c9a071d93e5f77eacf5023c22c42c7297f2ec5eac7ca518d

                                                                                      SHA512

                                                                                      4873c2d24c82d041d66a93d964d70e9414b539c04e0d87950cd96e098bd125f4209bc65e71f6cf703f52525f45954c484904326794781dee369c6dcf64e591a4

                                                                                    • C:\Users\Admin\Downloads\Mercurial.Grabber.v1.03\ImpactFixer.exe

                                                                                      Filesize

                                                                                      42KB

                                                                                      MD5

                                                                                      d3e56ac8b869915b72c95bcf30f71538

                                                                                      SHA1

                                                                                      0bb57799244ac274f65f373b791fe1d501967894

                                                                                      SHA256

                                                                                      64437f079250970572c0f7f559e5b654bbaa5ba95ae56796d5d59be224129db5

                                                                                      SHA512

                                                                                      9bcda5e184cf4470e24ec225bd64d161faba7ccd50e7bc479f5328870531ae0eaf62d44babea5b2efa9dc2368f369771b571416b9dccbc8a06eebcf4874a52d9

                                                                                    • C:\Users\Admin\Downloads\Mercurial.Grabber.v1.03\Mercurial.exe

                                                                                      Filesize

                                                                                      3.2MB

                                                                                      MD5

                                                                                      a9477b3e21018b96fc5d2264d4016e65

                                                                                      SHA1

                                                                                      493fa8da8bf89ea773aeb282215f78219a5401b7

                                                                                      SHA256

                                                                                      890fd59af3370e2ce12e0d11916d1ad4ee9b9c267c434347dbed11e9572e8645

                                                                                      SHA512

                                                                                      66529a656865400fe37d40ae125a1d057f8be5aa17da80d367ebbe1a9dcea38f5174870d0dc5b56771f6ca5a13e2fad22d803f5357f3ef59a46e3bdf0cc5ee9c

                                                                                    • C:\Users\Admin\Downloads\Mercurial.Grabber.v1.03\gxsdg.txt

                                                                                      Filesize

                                                                                      121B

                                                                                      MD5

                                                                                      658a1bbce35b80f1756a997d9e6ef71c

                                                                                      SHA1

                                                                                      89ea68763e45cbfd30704313c33d80824d06a673

                                                                                      SHA256

                                                                                      69118644b1088bb40d04fd8fb30915eef9fa19fa7b50b521a50dc2d07f7a2793

                                                                                      SHA512

                                                                                      92f296fe553c44a5abcfac789ea10fe3a2b3ea33f0ade9829aa16e63314655989ef93fa4ca95c82195835ad1235670d18e63ebfc75751e2804657956bc849f1a

                                                                                    • C:\Users\Admin\Downloads\Unconfirmed 799683.crdownload

                                                                                      Filesize

                                                                                      1.5MB

                                                                                      MD5

                                                                                      0330d0bd7341a9afe5b6d161b1ff4aa1

                                                                                      SHA1

                                                                                      86918e72f2e43c9c664c246e62b41452d662fbf3

                                                                                      SHA256

                                                                                      67cb9d3452c9dd974b04f4a5fd842dbcba8184f2344ff72e3662d7cdb68b099b

                                                                                      SHA512

                                                                                      850382414d9d33eab134f8bd89dc99759f8d0459b7ad48bd9588405a3705aeb2cd727898529e3f71d9776a42e141c717e844e0b5c358818bbeac01d096907ad1

                                                                                    • C:\Users\Admin\Downloads\winrar-x64-701.exe

                                                                                      Filesize

                                                                                      3.7MB

                                                                                      MD5

                                                                                      3a2f16a044d8f6d2f9443dff6bd1c7d4

                                                                                      SHA1

                                                                                      48c6c0450af803b72a0caa7d5e3863c3f0240ef1

                                                                                      SHA256

                                                                                      31f7ba37180f820313b2d32e76252344598409cb932109dd84a071cd58b64aa6

                                                                                      SHA512

                                                                                      61daee2ce82c3b8e79f7598a79d72e337220ced7607e3ed878a3059ac03257542147dbd377e902cc95f04324e2fb7c5e07d1410f0a1815d5a05c5320e5715ef6

                                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\ayixpwjp\ayixpwjp.0.cs

                                                                                      Filesize

                                                                                      11KB

                                                                                      MD5

                                                                                      d98cb4a3bc2808a5b327dee0fdd4117e

                                                                                      SHA1

                                                                                      30278f73bbd33e0bae2074820605415d1832e282

                                                                                      SHA256

                                                                                      01d8383cb75c2e67c525be00c83655d273630cf2ec3dbdf1a4c825a590adf829

                                                                                      SHA512

                                                                                      ed997655eda35279b48165eb981cae39331827aa80354690ac38c12814a6a13560c3299e832a4556fca6712e4f69b05f90e3a37f0f95d53cfa83d8901a91cb21

                                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\ayixpwjp\ayixpwjp.1.cs

                                                                                      Filesize

                                                                                      5KB

                                                                                      MD5

                                                                                      8aab1997664a604aca551b20202bfd14

                                                                                      SHA1

                                                                                      279cf8f218069cbf4351518ad6df9a783ca34bc5

                                                                                      SHA256

                                                                                      029f57fa483bbcee0dd5464e0d4d89bd03032161424d0ffd1da2b3d5db15977f

                                                                                      SHA512

                                                                                      cf0efea853d7e1997dcfcc9a73668ed9a5ac01cf22cbb7082a05abc141fccc7c92a936b245666071df75389cd7ebe60dc99b3c21279173fe12888a99034a5eda

                                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\ayixpwjp\ayixpwjp.2.cs

                                                                                      Filesize

                                                                                      7KB

                                                                                      MD5

                                                                                      6fdae9afc1f8e77e882f1ba6b5859a4e

                                                                                      SHA1

                                                                                      33eb96f75ffe9a1c4f94388e7465b997320265a5

                                                                                      SHA256

                                                                                      a365264dd2d3388acc38b2f5c8f3c267bbf83ca463f70fbf6c8459123a7cc33d

                                                                                      SHA512

                                                                                      97bb77e8c9c7a1a46fa416a917787ddced3439f72ea35558f22fa2450fbbd11928f3442baec0b33b14576683baa6c1c6b3e1376bd7742da358c808bf07db28e9

                                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\ayixpwjp\ayixpwjp.3.cs

                                                                                      Filesize

                                                                                      8KB

                                                                                      MD5

                                                                                      6ba707982ee7e5f0ae55ce3fa5ccad17

                                                                                      SHA1

                                                                                      d094c98491058ed49861ce82701abe1f38385f18

                                                                                      SHA256

                                                                                      19af9bea270f830354af8250cd82db32fdcab6327d139e2720713fb7d43a5797

                                                                                      SHA512

                                                                                      d9cf480c32bfb806c72a2dc6fe211c4806388ccf548d55b059e633e8f814d46c80ef73eacfb02398fd3b1e75b7c44b8a1ba0b29476edbf9fe1b29322798d3cfa

                                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\ayixpwjp\ayixpwjp.4.cs

                                                                                      Filesize

                                                                                      2KB

                                                                                      MD5

                                                                                      fae5458a5b3cee952e25d44d6eb9db85

                                                                                      SHA1

                                                                                      060d40137e9cce9f40adbb3b3763d1f020601e42

                                                                                      SHA256

                                                                                      240478bb9c522341906a0ef376e0188ce6106856a26a3ae0f7b58af07a377a06

                                                                                      SHA512

                                                                                      25f406f747518aef3a1c5c3d66e8bd474429b05ef994303c5f7bc5d3669d691d9dc21ea8f8a35e20b84f8c406bf89835f2f5007a8f743df755e67b4c380fa236

                                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\ayixpwjp\ayixpwjp.5.cs

                                                                                      Filesize

                                                                                      4KB

                                                                                      MD5

                                                                                      42f157ad8e79e06a142791d6e98e0365

                                                                                      SHA1

                                                                                      a05e8946e04907af3f631a7de1537d7c1bb34443

                                                                                      SHA256

                                                                                      e30402cd45589982489719678adf59b016674faa6f7a9af074601e978cc9a0ed

                                                                                      SHA512

                                                                                      e214e1cd49e677e1ed632e86e4d1680b0d04a7a0086a273422c14c28485dc549cc5b4bde13e45336f0c4b842751dfd6ef702df3524bc6570c477a4f713db09dc

                                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\ayixpwjp\ayixpwjp.6.cs

                                                                                      Filesize

                                                                                      6KB

                                                                                      MD5

                                                                                      8ec0f0e49ffe092345673ab4d9f45641

                                                                                      SHA1

                                                                                      401bd9e2894e9098504f7cc8f8d52f86c3ebe495

                                                                                      SHA256

                                                                                      93b9f783b5faed3ecfafbe20dfcf1bee3ce33f66909879cd39ae88c36acbdfac

                                                                                      SHA512

                                                                                      60363b36587a3ace9ae1dbc21ffd39f903e5f51945eebdcf0316904eee316c9d711d7a014b28977d54eef25dec13f659aab06325f761d9f3ce9baca3cb12f248

                                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\ayixpwjp\ayixpwjp.7.cs

                                                                                      Filesize

                                                                                      16KB

                                                                                      MD5

                                                                                      05206d577ce19c1ef8d9341b93cd5520

                                                                                      SHA1

                                                                                      1ee5c862592045912eb45f9d94376f47b5410d3d

                                                                                      SHA256

                                                                                      e2bbdc7ba4236f9c4cb829d63137fdac3a308fd5da96acea35212beafe01b877

                                                                                      SHA512

                                                                                      4648fa7ea0a35a148e9dac1f659601ebf48910ca699ed9ef8d46614c7cbe14fcf47fa30dc87af53b987934a2a56cd71fd0e58182ef36a97ed47bd84637b54855

                                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\ayixpwjp\ayixpwjp.8.cs

                                                                                      Filesize

                                                                                      561B

                                                                                      MD5

                                                                                      7ae06a071e39d392c21f8395ef5a9261

                                                                                      SHA1

                                                                                      007e618097c9a099c9f5c3129e5bbf1fc7deb930

                                                                                      SHA256

                                                                                      00e152629bdbf25a866f98e6fc30626d2514527beef1b76ebb85b1f5f9c83718

                                                                                      SHA512

                                                                                      5203c937597e51b97273040fe441392e0df7841f680fcca0d761ac6d47b72d02c8918614f030fbf23d8a58cb5625b702546e4c6f93e130cc5d3b41c154c42655

                                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\ayixpwjp\ayixpwjp.9.cs

                                                                                      Filesize

                                                                                      10KB

                                                                                      MD5

                                                                                      380d15f61b0e775054eefdce7279510d

                                                                                      SHA1

                                                                                      47285dc55dafd082edd1851eea8edc2f7a1d0157

                                                                                      SHA256

                                                                                      bef491a61351ad58cda96b73dba70027fdbe4966917e33145ba5cfa8c83bc717

                                                                                      SHA512

                                                                                      d4cbaad29d742d55926fea6b3fa1cf754c3e71736e763d9271dc983e08fce5251fa849d4ecdc1187c29f92e27adab22b8f99791e46302b5d9c2e90b832c28c28

                                                                                    • \??\c:\Users\Admin\AppData\Local\Temp\ayixpwjp\ayixpwjp.cmdline

                                                                                      Filesize

                                                                                      838B

                                                                                      MD5

                                                                                      9e23ff89992df9d2373043b5b9510cd1

                                                                                      SHA1

                                                                                      ec1bd8728a7dc80b89de0d98ea7ab6849fedd9bf

                                                                                      SHA256

                                                                                      72a605b42d6bc3ec2d2cb67356a6772288e24add19c299b0be3804710226ae28

                                                                                      SHA512

                                                                                      405b95b4ce29875371c63a0bf512a93402e4c4274b504d12b5391b08f23bd0e6a34e11fed54d8566d37031575fea096e3da0743fdad61b24f0fd7f27f66d28c5

                                                                                    • \??\c:\Users\Admin\Downloads\Mercurial.Grabber.v1.03\CSC5BD1450B49F64D3CBDF733D517BC5B49.TMP

                                                                                      Filesize

                                                                                      1KB

                                                                                      MD5

                                                                                      ff5a81ac5b8a4d5103b184efdd366314

                                                                                      SHA1

                                                                                      5a15f03301846c5fe9d82a2a1ab8ddbc9935d10c

                                                                                      SHA256

                                                                                      e511d97458e39de8646efafdd9c90dd796bda175adc8c6c0aedd814d2e67ccbc

                                                                                      SHA512

                                                                                      f375c33112c901eb225ff890c978efc1f0e6c10ada5db796497e6440183996e6d40342019c86b3cd1841323e895da98d15ba6c8d101652e5ae9d0ecbbd20cf7f

                                                                                    • memory/3416-349-0x000001FA8D510000-0x000001FA8D511000-memory.dmp

                                                                                      Filesize

                                                                                      4KB

                                                                                    • memory/3416-351-0x000001FA8D520000-0x000001FA8D521000-memory.dmp

                                                                                      Filesize

                                                                                      4KB

                                                                                    • memory/3416-332-0x000001FA84770000-0x000001FA84780000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/3416-336-0x000001FA847B0000-0x000001FA847C0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/3416-343-0x000001FA8D400000-0x000001FA8D401000-memory.dmp

                                                                                      Filesize

                                                                                      4KB

                                                                                    • memory/3416-345-0x000001FA8D480000-0x000001FA8D481000-memory.dmp

                                                                                      Filesize

                                                                                      4KB

                                                                                    • memory/3416-347-0x000001FA8D480000-0x000001FA8D481000-memory.dmp

                                                                                      Filesize

                                                                                      4KB

                                                                                    • memory/3416-348-0x000001FA8D510000-0x000001FA8D511000-memory.dmp

                                                                                      Filesize

                                                                                      4KB

                                                                                    • memory/3416-350-0x000001FA8D520000-0x000001FA8D521000-memory.dmp

                                                                                      Filesize

                                                                                      4KB

                                                                                    • memory/3644-1052-0x0000000000010000-0x0000000000020000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/5908-990-0x00000000052D0000-0x00000000052E4000-memory.dmp

                                                                                      Filesize

                                                                                      80KB

                                                                                    • memory/5908-989-0x00000000052C0000-0x00000000052D0000-memory.dmp

                                                                                      Filesize

                                                                                      64KB

                                                                                    • memory/5908-985-0x00000000051B0000-0x00000000051BA000-memory.dmp

                                                                                      Filesize

                                                                                      40KB

                                                                                    • memory/5908-984-0x00000000050E0000-0x0000000005172000-memory.dmp

                                                                                      Filesize

                                                                                      584KB

                                                                                    • memory/5908-983-0x0000000005690000-0x0000000005C34000-memory.dmp

                                                                                      Filesize

                                                                                      5.6MB

                                                                                    • memory/5908-994-0x0000000005330000-0x000000000533E000-memory.dmp

                                                                                      Filesize

                                                                                      56KB

                                                                                    • memory/5908-982-0x00000000002D0000-0x000000000060A000-memory.dmp

                                                                                      Filesize

                                                                                      3.2MB

                                                                                    • memory/5908-987-0x0000000005260000-0x0000000005280000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/5908-988-0x0000000005280000-0x00000000052A0000-memory.dmp

                                                                                      Filesize

                                                                                      128KB

                                                                                    • memory/5908-986-0x0000000005230000-0x000000000524C000-memory.dmp

                                                                                      Filesize

                                                                                      112KB

                                                                                    • memory/5908-993-0x00000000053C0000-0x00000000053F6000-memory.dmp

                                                                                      Filesize

                                                                                      216KB

                                                                                    • memory/5908-998-0x0000000005C40000-0x0000000005C70000-memory.dmp

                                                                                      Filesize

                                                                                      192KB

                                                                                    • memory/5908-991-0x0000000005350000-0x00000000053BE000-memory.dmp

                                                                                      Filesize

                                                                                      440KB

                                                                                    • memory/5908-996-0x0000000005C80000-0x0000000005DCA000-memory.dmp

                                                                                      Filesize

                                                                                      1.3MB

                                                                                    • memory/5908-997-0x0000000005DD0000-0x0000000005EE6000-memory.dmp

                                                                                      Filesize

                                                                                      1.1MB

                                                                                    • memory/5908-992-0x00000000052F0000-0x000000000530E000-memory.dmp

                                                                                      Filesize

                                                                                      120KB

                                                                                    • memory/5908-999-0x0000000008A30000-0x0000000008A38000-memory.dmp

                                                                                      Filesize

                                                                                      32KB

                                                                                    • memory/5908-995-0x0000000005410000-0x000000000541E000-memory.dmp

                                                                                      Filesize

                                                                                      56KB