Analysis

  • max time kernel
    515s
  • max time network
    546s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-11-2024 04:31

Errors

Reason
Machine shutdown

General

  • Target

    https://mega.nz/file/gQ53HbCL#7bbz3SpvcEx89QOytcNzEwJSdXduzEbmgwveereRTOA

Malware Config

Extracted

Path

C:\Users\Admin\Downloads\!Please Read Me!.txt

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1 Next, please find the decrypt software on your desktop, an executable file named "!WannaDecryptor!.exe". If it does not exsit, download the software from the address below. (You may need to disable your antivirus for a while.) rar password: wcry123 Run and follow the instructions! �
Wallets

15zGqZCTcys6eCjDkE3DypCjXi6QWRV6V1

Extracted

Path

C:\Users\Admin\Downloads\r.wry

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send %s to this bitcoin address: %s Next, please find the decrypt software on your desktop, an executable file named "%s". If it does not exsit, download the software from the address below. (You may need to disable your antivirus for a while.) %s rar password: wcry123 Run and follow the instructions!

Extracted

Family

warzonerat

C2

168.61.222.215:5400

Signatures

  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzonerat family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • ReZer0 packer 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Warzone RAT payload 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file
  • A potential corporate email address has been identified in the URL: [email protected]
  • Checks computer location settings 2 TTPs 10 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 32 IoCs
  • Loads dropped DLL 64 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Drops file in System32 directory 3 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 56 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 4 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 37 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 56 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://mega.nz/file/gQ53HbCL#7bbz3SpvcEx89QOytcNzEwJSdXduzEbmgwveereRTOA
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd4b146f8,0x7ffbd4b14708,0x7ffbd4b14718
      2⤵
        PID:4576
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:2
        2⤵
          PID:2936
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2496 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4004
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:8
          2⤵
            PID:3372
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
            2⤵
              PID:2848
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
              2⤵
                PID:4876
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:1
                2⤵
                  PID:1440
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:1
                  2⤵
                    PID:4672
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:1
                    2⤵
                      PID:3932
                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 /prefetch:8
                      2⤵
                        PID:3500
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:2584
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:1
                        2⤵
                          PID:1384
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:1
                          2⤵
                            PID:852
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:1
                            2⤵
                              PID:4644
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:1
                              2⤵
                                PID:2928
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:1
                                2⤵
                                  PID:3244
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6156 /prefetch:1
                                  2⤵
                                    PID:1704
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:1
                                    2⤵
                                      PID:4976
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3740 /prefetch:8
                                      2⤵
                                        PID:3716
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6500 /prefetch:1
                                        2⤵
                                          PID:4380
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6496 /prefetch:1
                                          2⤵
                                            PID:1748
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6248 /prefetch:1
                                            2⤵
                                              PID:5212
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6760 /prefetch:1
                                              2⤵
                                                PID:5220
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6492 /prefetch:8
                                                2⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5676
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:1
                                                2⤵
                                                  PID:5132
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:1
                                                  2⤵
                                                    PID:3260
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6504 /prefetch:1
                                                    2⤵
                                                      PID:5644
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6428 /prefetch:1
                                                      2⤵
                                                        PID:1272
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=7120 /prefetch:2
                                                        2⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:716
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:1
                                                        2⤵
                                                          PID:2556
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7256 /prefetch:1
                                                          2⤵
                                                            PID:4812
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7528 /prefetch:1
                                                            2⤵
                                                              PID:2208
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7672 /prefetch:1
                                                              2⤵
                                                                PID:812
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7756 /prefetch:1
                                                                2⤵
                                                                  PID:5984
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8016 /prefetch:1
                                                                  2⤵
                                                                    PID:5564
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:1
                                                                    2⤵
                                                                      PID:644
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=37 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8124 /prefetch:1
                                                                      2⤵
                                                                        PID:3188
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7588 /prefetch:1
                                                                        2⤵
                                                                          PID:5508
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7192 /prefetch:1
                                                                          2⤵
                                                                            PID:3144
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=41 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7052 /prefetch:1
                                                                            2⤵
                                                                              PID:1672
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4120 /prefetch:8
                                                                              2⤵
                                                                                PID:5424
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7988 /prefetch:1
                                                                                2⤵
                                                                                  PID:1856
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7928 /prefetch:1
                                                                                  2⤵
                                                                                    PID:3080
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1884 /prefetch:1
                                                                                    2⤵
                                                                                      PID:3324
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 /prefetch:8
                                                                                      2⤵
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:4872
                                                                                    • C:\Users\Admin\Downloads\WannaCry.exe
                                                                                      "C:\Users\Admin\Downloads\WannaCry.exe"
                                                                                      2⤵
                                                                                      • Drops startup file
                                                                                      • Executes dropped EXE
                                                                                      • Adds Run key to start application
                                                                                      PID:1948
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        C:\Windows\system32\cmd.exe /c 165421731386351.bat
                                                                                        3⤵
                                                                                          PID:5856
                                                                                          • C:\Windows\SysWOW64\cscript.exe
                                                                                            cscript //nologo c.vbs
                                                                                            4⤵
                                                                                              PID:2712
                                                                                          • C:\Users\Admin\Downloads\!WannaDecryptor!.exe
                                                                                            !WannaDecryptor!.exe f
                                                                                            3⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:5480
                                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                                            taskkill /f /im MSExchange*
                                                                                            3⤵
                                                                                            • Kills process with taskkill
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:1540
                                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                                            taskkill /f /im Microsoft.Exchange.*
                                                                                            3⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Kills process with taskkill
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:4456
                                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                                            taskkill /f /im sqlserver.exe
                                                                                            3⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Kills process with taskkill
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:3220
                                                                                          • C:\Windows\SysWOW64\taskkill.exe
                                                                                            taskkill /f /im sqlwriter.exe
                                                                                            3⤵
                                                                                            • Kills process with taskkill
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:4304
                                                                                          • C:\Users\Admin\Downloads\!WannaDecryptor!.exe
                                                                                            !WannaDecryptor!.exe c
                                                                                            3⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:6904
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            cmd.exe /c start /b !WannaDecryptor!.exe v
                                                                                            3⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:7084
                                                                                            • C:\Users\Admin\Downloads\!WannaDecryptor!.exe
                                                                                              !WannaDecryptor!.exe v
                                                                                              4⤵
                                                                                              • Executes dropped EXE
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:6760
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                cmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet
                                                                                                5⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:5528
                                                                                                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                  wmic shadowcopy delete
                                                                                                  6⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:4948
                                                                                          • C:\Users\Admin\Downloads\!WannaDecryptor!.exe
                                                                                            !WannaDecryptor!.exe
                                                                                            3⤵
                                                                                            • Executes dropped EXE
                                                                                            • Sets desktop wallpaper using registry
                                                                                            PID:5652
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=48 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8204 /prefetch:1
                                                                                          2⤵
                                                                                            PID:7112
                                                                                          • C:\Users\Admin\Downloads\WannaCry.exe
                                                                                            "C:\Users\Admin\Downloads\WannaCry.exe"
                                                                                            2⤵
                                                                                            • Executes dropped EXE
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:232
                                                                                          • C:\Users\Admin\Downloads\WannaCry.exe
                                                                                            "C:\Users\Admin\Downloads\WannaCry.exe"
                                                                                            2⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:408
                                                                                          • C:\Users\Admin\Downloads\WannaCry.exe
                                                                                            "C:\Users\Admin\Downloads\WannaCry.exe"
                                                                                            2⤵
                                                                                            • Executes dropped EXE
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:6196
                                                                                          • C:\Users\Admin\Downloads\WannaCry.exe
                                                                                            "C:\Users\Admin\Downloads\WannaCry.exe"
                                                                                            2⤵
                                                                                            • Executes dropped EXE
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:6172
                                                                                          • C:\Users\Admin\Downloads\WannaCry.exe
                                                                                            "C:\Users\Admin\Downloads\WannaCry.exe"
                                                                                            2⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:868
                                                                                          • C:\Users\Admin\Downloads\WannaCry.exe
                                                                                            "C:\Users\Admin\Downloads\WannaCry.exe"
                                                                                            2⤵
                                                                                            • Executes dropped EXE
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:6276
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=50 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7624 /prefetch:1
                                                                                            2⤵
                                                                                              PID:6312
                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=8432 /prefetch:8
                                                                                              2⤵
                                                                                                PID:6180
                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=53 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8280 /prefetch:1
                                                                                                2⤵
                                                                                                  PID:7108
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=7284 /prefetch:8
                                                                                                  2⤵
                                                                                                    PID:1104
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7504 /prefetch:8
                                                                                                    2⤵
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    PID:5612
                                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7828 /prefetch:8
                                                                                                    2⤵
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    PID:5196
                                                                                                  • C:\Users\Admin\Downloads\WarzoneRAT.exe
                                                                                                    "C:\Users\Admin\Downloads\WarzoneRAT.exe"
                                                                                                    2⤵
                                                                                                    • Checks computer location settings
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of SetThreadContext
                                                                                                    • NTFS ADS
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    PID:4948
                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3E2B.tmp"
                                                                                                      3⤵
                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                      PID:4304
                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                      3⤵
                                                                                                        PID:7076
                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                        3⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:5956
                                                                                                    • C:\Users\Admin\Downloads\WarzoneRAT.exe
                                                                                                      "C:\Users\Admin\Downloads\WarzoneRAT.exe"
                                                                                                      2⤵
                                                                                                      • Checks computer location settings
                                                                                                      • Executes dropped EXE
                                                                                                      • Suspicious use of SetThreadContext
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      PID:6500
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4668.tmp"
                                                                                                        3⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:5468
                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                        3⤵
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        PID:6572
                                                                                                    • C:\Users\Admin\Downloads\WarzoneRAT.exe
                                                                                                      "C:\Users\Admin\Downloads\WarzoneRAT.exe"
                                                                                                      2⤵
                                                                                                      • Checks computer location settings
                                                                                                      • Executes dropped EXE
                                                                                                      • Suspicious use of SetThreadContext
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      PID:5576
                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4724.tmp"
                                                                                                        3⤵
                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                        PID:6508
                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                        3⤵
                                                                                                          PID:1104
                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                          3⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:6608
                                                                                                      • C:\Users\Admin\Downloads\WarzoneRAT.exe
                                                                                                        "C:\Users\Admin\Downloads\WarzoneRAT.exe"
                                                                                                        2⤵
                                                                                                        • Checks computer location settings
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious use of SetThreadContext
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        PID:7080
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4A31.tmp"
                                                                                                          3⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                          PID:6636
                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                          3⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:5612
                                                                                                      • C:\Users\Admin\Downloads\WarzoneRAT.exe
                                                                                                        "C:\Users\Admin\Downloads\WarzoneRAT.exe"
                                                                                                        2⤵
                                                                                                        • Checks computer location settings
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious use of SetThreadContext
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        PID:6944
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4B0C.tmp"
                                                                                                          3⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                          PID:5608
                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                          3⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:4944
                                                                                                      • C:\Users\Admin\Downloads\WarzoneRAT.exe
                                                                                                        "C:\Users\Admin\Downloads\WarzoneRAT.exe"
                                                                                                        2⤵
                                                                                                        • Checks computer location settings
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious use of SetThreadContext
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        PID:6984
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4C15.tmp"
                                                                                                          3⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                          PID:1940
                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                          3⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:5988
                                                                                                      • C:\Users\Admin\Downloads\WarzoneRAT.exe
                                                                                                        "C:\Users\Admin\Downloads\WarzoneRAT.exe"
                                                                                                        2⤵
                                                                                                        • Checks computer location settings
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious use of SetThreadContext
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        PID:7056
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5424.tmp"
                                                                                                          3⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                          PID:3268
                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                          3⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:3608
                                                                                                      • C:\Users\Admin\Downloads\WarzoneRAT.exe
                                                                                                        "C:\Users\Admin\Downloads\WarzoneRAT.exe"
                                                                                                        2⤵
                                                                                                        • Checks computer location settings
                                                                                                        • Executes dropped EXE
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        PID:5012
                                                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                                                          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6AF8.tmp"
                                                                                                          3⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Scheduled Task/Job: Scheduled Task
                                                                                                          PID:4956
                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                          3⤵
                                                                                                            PID:6508
                                                                                                        • C:\Users\Admin\Downloads\WarzoneRAT.exe
                                                                                                          "C:\Users\Admin\Downloads\WarzoneRAT.exe"
                                                                                                          2⤵
                                                                                                          • Checks computer location settings
                                                                                                          • Executes dropped EXE
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          PID:4816
                                                                                                          • C:\Windows\SysWOW64\schtasks.exe
                                                                                                            "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6C11.tmp"
                                                                                                            3⤵
                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                            • Scheduled Task/Job: Scheduled Task
                                                                                                            PID:4948
                                                                                                          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                            3⤵
                                                                                                              PID:5488
                                                                                                            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                              3⤵
                                                                                                                PID:4452
                                                                                                              • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                3⤵
                                                                                                                  PID:4864
                                                                                                                • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                  "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                  3⤵
                                                                                                                    PID:5576
                                                                                                                  • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                    "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                    3⤵
                                                                                                                      PID:6804
                                                                                                                  • C:\Users\Admin\Downloads\WarzoneRAT.exe
                                                                                                                    "C:\Users\Admin\Downloads\WarzoneRAT.exe"
                                                                                                                    2⤵
                                                                                                                    • Checks computer location settings
                                                                                                                    • Executes dropped EXE
                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                                    PID:6384
                                                                                                                    • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6E72.tmp"
                                                                                                                      3⤵
                                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                                      PID:4780
                                                                                                                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                      3⤵
                                                                                                                        PID:6368
                                                                                                                    • C:\Users\Admin\Downloads\WarzoneRAT.exe
                                                                                                                      "C:\Users\Admin\Downloads\WarzoneRAT.exe"
                                                                                                                      2⤵
                                                                                                                      • Executes dropped EXE
                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                                      PID:3876
                                                                                                                      • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\jFvfxe" /XML "C:\Users\Admin\AppData\Local\Temp\tmp7057.tmp"
                                                                                                                        3⤵
                                                                                                                        • Scheduled Task/Job: Scheduled Task
                                                                                                                        PID:6936
                                                                                                                      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                        3⤵
                                                                                                                          PID:6700
                                                                                                                        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                                                                                                                          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                                                                                                                          3⤵
                                                                                                                            PID:6932
                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=58 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8468 /prefetch:1
                                                                                                                          2⤵
                                                                                                                            PID:3980
                                                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=8704 /prefetch:8
                                                                                                                            2⤵
                                                                                                                              PID:220
                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=61 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8444 /prefetch:1
                                                                                                                              2⤵
                                                                                                                                PID:2592
                                                                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2056,17367015658057891786,8049443004495883854,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7284 /prefetch:8
                                                                                                                                2⤵
                                                                                                                                  PID:1576
                                                                                                                                • C:\Users\Admin\Downloads\PowerPoint.exe
                                                                                                                                  "C:\Users\Admin\Downloads\PowerPoint.exe"
                                                                                                                                  2⤵
                                                                                                                                    PID:6980
                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\sys3.exe
                                                                                                                                      C:\Users\Admin\AppData\Local\Temp\\sys3.exe
                                                                                                                                      3⤵
                                                                                                                                        PID:6908
                                                                                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                    1⤵
                                                                                                                                      PID:2124
                                                                                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                                                      1⤵
                                                                                                                                        PID:1804
                                                                                                                                      • C:\Windows\System32\rundll32.exe
                                                                                                                                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                                        1⤵
                                                                                                                                          PID:5820
                                                                                                                                        • C:\Users\Admin\Downloads\Bonzi\BonziBuddy432.exe
                                                                                                                                          "C:\Users\Admin\Downloads\Bonzi\BonziBuddy432.exe"
                                                                                                                                          1⤵
                                                                                                                                          • Loads dropped DLL
                                                                                                                                          • Modifies registry class
                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                          PID:6092
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\BonziBuddy432\Runtimes\CheckRuntimes.bat" "
                                                                                                                                            2⤵
                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                            PID:4608
                                                                                                                                        • C:\Users\Admin\Downloads\Bonzi\BonziBuddy432.exe
                                                                                                                                          "C:\Users\Admin\Downloads\Bonzi\BonziBuddy432.exe"
                                                                                                                                          1⤵
                                                                                                                                          • Loads dropped DLL
                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                          • Modifies registry class
                                                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                                                          PID:6140
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\BonziBuddy432\Runtimes\CheckRuntimes.bat" "
                                                                                                                                            2⤵
                                                                                                                                              PID:4528
                                                                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://bonzibuddy.tk/
                                                                                                                                              2⤵
                                                                                                                                                PID:1388
                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffbd4b146f8,0x7ffbd4b14708,0x7ffbd4b14718
                                                                                                                                                  3⤵
                                                                                                                                                    PID:4536
                                                                                                                                              • C:\Users\Admin\Downloads\Bonzi\BonziBuddy432.exe
                                                                                                                                                "C:\Users\Admin\Downloads\Bonzi\BonziBuddy432.exe"
                                                                                                                                                1⤵
                                                                                                                                                • Loads dropped DLL
                                                                                                                                                • Drops file in Program Files directory
                                                                                                                                                • Drops file in Windows directory
                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                • Modifies registry class
                                                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                                                PID:5384
                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\BonziBuddy432\Runtimes\CheckRuntimes.bat" "
                                                                                                                                                  2⤵
                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                  PID:5456
                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\Runtimes\MSAGENT.EXE
                                                                                                                                                    MSAGENT.EXE
                                                                                                                                                    3⤵
                                                                                                                                                    • Boot or Logon Autostart Execution: Active Setup
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                    PID:5472
                                                                                                                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                      regsvr32 /s "C:\Windows\msagent\AgentCtl.dll"
                                                                                                                                                      4⤵
                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      • Modifies registry class
                                                                                                                                                      PID:5452
                                                                                                                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                      regsvr32 /s "C:\Windows\msagent\AgentDPv.dll"
                                                                                                                                                      4⤵
                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:4784
                                                                                                                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                      regsvr32 /s "C:\Windows\msagent\mslwvtts.dll"
                                                                                                                                                      4⤵
                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:4580
                                                                                                                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                      regsvr32 /s "C:\Windows\msagent\AgentDP2.dll"
                                                                                                                                                      4⤵
                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:3164
                                                                                                                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                      regsvr32 /s "C:\Windows\msagent\AgentMPx.dll"
                                                                                                                                                      4⤵
                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:1272
                                                                                                                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                      regsvr32 /s "C:\Windows\msagent\AgentSR.dll"
                                                                                                                                                      4⤵
                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:5684
                                                                                                                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                      regsvr32 /s "C:\Windows\msagent\AgentPsh.dll"
                                                                                                                                                      4⤵
                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                      PID:5740
                                                                                                                                                    • C:\Windows\msagent\AgentSvr.exe
                                                                                                                                                      "C:\Windows\msagent\AgentSvr.exe" /regserver
                                                                                                                                                      4⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      • Modifies registry class
                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                      PID:5744
                                                                                                                                                    • C:\Windows\SysWOW64\grpconv.exe
                                                                                                                                                      grpconv.exe -o
                                                                                                                                                      4⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:5748
                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\Runtimes\tv_enua.exe
                                                                                                                                                    tv_enua.exe
                                                                                                                                                    3⤵
                                                                                                                                                    • Boot or Logon Autostart Execution: Active Setup
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                    • Adds Run key to start application
                                                                                                                                                    • Drops file in System32 directory
                                                                                                                                                    • Drops file in Windows directory
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                    PID:3932
                                                                                                                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                      regsvr32 /s C:\Windows\lhsp\tv\tv_enua.dll
                                                                                                                                                      4⤵
                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:3148
                                                                                                                                                    • C:\Windows\SysWOW64\regsvr32.exe
                                                                                                                                                      regsvr32 /s C:\Windows\lhsp\tv\tvenuax.dll
                                                                                                                                                      4⤵
                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      • Modifies registry class
                                                                                                                                                      PID:548
                                                                                                                                                    • C:\Windows\SysWOW64\grpconv.exe
                                                                                                                                                      grpconv.exe -o
                                                                                                                                                      4⤵
                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                      PID:1364
                                                                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://bonzibuddy.tk/
                                                                                                                                                  2⤵
                                                                                                                                                    PID:6108
                                                                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf8,0x124,0x7ffbd4b146f8,0x7ffbd4b14708,0x7ffbd4b14718
                                                                                                                                                      3⤵
                                                                                                                                                        PID:6132
                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\BonziBDY_35.EXE
                                                                                                                                                    "C:\Program Files (x86)\BonziBuddy432\BonziBDY_35.EXE"
                                                                                                                                                    1⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                    • Modifies registry class
                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                    PID:5128
                                                                                                                                                  • C:\Windows\msagent\AgentSvr.exe
                                                                                                                                                    C:\Windows\msagent\AgentSvr.exe -Embedding
                                                                                                                                                    1⤵
                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                    • Loads dropped DLL
                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                    • Suspicious use of SendNotifyMessage
                                                                                                                                                    PID:1364
                                                                                                                                                  • C:\Windows\system32\AUDIODG.EXE
                                                                                                                                                    C:\Windows\system32\AUDIODG.EXE 0x494 0x3e4
                                                                                                                                                    1⤵
                                                                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                    PID:5296
                                                                                                                                                  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
                                                                                                                                                    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
                                                                                                                                                    1⤵
                                                                                                                                                      PID:2156
                                                                                                                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                                                                      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                                                                                                                                                      1⤵
                                                                                                                                                      • Modifies Internet Explorer settings
                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                      PID:5348
                                                                                                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5348 CREDAT:17410 /prefetch:2
                                                                                                                                                        2⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        • Modifies Internet Explorer settings
                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                        PID:2364
                                                                                                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5348 CREDAT:17414 /prefetch:2
                                                                                                                                                        2⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        • Modifies Internet Explorer settings
                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                        PID:4736
                                                                                                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5348 CREDAT:17418 /prefetch:2
                                                                                                                                                        2⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        • Modifies Internet Explorer settings
                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                        PID:668
                                                                                                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5348 CREDAT:17422 /prefetch:2
                                                                                                                                                        2⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        • Modifies Internet Explorer settings
                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                        PID:5440
                                                                                                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5348 CREDAT:17428 /prefetch:2
                                                                                                                                                        2⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        • Modifies Internet Explorer settings
                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                        PID:2144
                                                                                                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5348 CREDAT:17434 /prefetch:2
                                                                                                                                                        2⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        • Modifies Internet Explorer settings
                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                        PID:5580
                                                                                                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5348 CREDAT:17440 /prefetch:2
                                                                                                                                                        2⤵
                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                        PID:4856
                                                                                                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5348 CREDAT:17446 /prefetch:2
                                                                                                                                                        2⤵
                                                                                                                                                        • Modifies Internet Explorer settings
                                                                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                                                                        PID:2716
                                                                                                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5348 CREDAT:17452 /prefetch:2
                                                                                                                                                        2⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        • Modifies Internet Explorer settings
                                                                                                                                                        PID:5072
                                                                                                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5348 CREDAT:17458 /prefetch:2
                                                                                                                                                        2⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        • Modifies Internet Explorer settings
                                                                                                                                                        PID:5004
                                                                                                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5348 CREDAT:17462 /prefetch:2
                                                                                                                                                        2⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        • Modifies Internet Explorer settings
                                                                                                                                                        PID:3696
                                                                                                                                                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                                                                                                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:5348 CREDAT:17470 /prefetch:2
                                                                                                                                                        2⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        • Modifies Internet Explorer settings
                                                                                                                                                        PID:5616
                                                                                                                                                    • C:\Program Files (x86)\BonziBuddy432\BonziBDY_35.EXE
                                                                                                                                                      "C:\Program Files (x86)\BonziBuddy432\BonziBDY_35.EXE"
                                                                                                                                                      1⤵
                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                      • Loads dropped DLL
                                                                                                                                                      • Drops file in Program Files directory
                                                                                                                                                      • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                                                                      PID:3184
                                                                                                                                                      • C:\Windows\SysWOW64\rundll32.exe
                                                                                                                                                        rundll32.exe shell32.dll,Control_RunDLL speech.cpl,,0
                                                                                                                                                        2⤵
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:5692
                                                                                                                                                        • C:\Windows\system32\RunDll32.exe
                                                                                                                                                          C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL speech.cpl,,0
                                                                                                                                                          3⤵
                                                                                                                                                            PID:5456
                                                                                                                                                      • C:\Windows\msagent\AgentSvr.exe
                                                                                                                                                        C:\Windows\msagent\AgentSvr.exe -Embedding
                                                                                                                                                        1⤵
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                        • Suspicious use of SendNotifyMessage
                                                                                                                                                        PID:6048
                                                                                                                                                      • C:\Program Files (x86)\BonziBuddy432\BonziBDY_35.EXE
                                                                                                                                                        "C:\Program Files (x86)\BonziBuddy432\BonziBDY_35.EXE"
                                                                                                                                                        1⤵
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        PID:1936
                                                                                                                                                      • C:\Windows\msagent\AgentSvr.exe
                                                                                                                                                        C:\Windows\msagent\AgentSvr.exe -Embedding
                                                                                                                                                        1⤵
                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                        • Suspicious use of SendNotifyMessage
                                                                                                                                                        PID:244
                                                                                                                                                      • C:\Windows\system32\OpenWith.exe
                                                                                                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                        1⤵
                                                                                                                                                          PID:6492
                                                                                                                                                        • C:\Users\Admin\Downloads\WannaCry.exe
                                                                                                                                                          "C:\Users\Admin\Downloads\WannaCry.exe"
                                                                                                                                                          1⤵
                                                                                                                                                          • Executes dropped EXE
                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                          PID:6616
                                                                                                                                                        • C:\Windows\system32\OpenWith.exe
                                                                                                                                                          C:\Windows\system32\OpenWith.exe -Embedding
                                                                                                                                                          1⤵
                                                                                                                                                            PID:6576
                                                                                                                                                          • C:\Windows\system32\vssvc.exe
                                                                                                                                                            C:\Windows\system32\vssvc.exe
                                                                                                                                                            1⤵
                                                                                                                                                              PID:4888
                                                                                                                                                            • C:\Windows\system32\LogonUI.exe
                                                                                                                                                              "LogonUI.exe" /flags:0x4 /state0:0xa3889055 /state1:0x41c64e6d
                                                                                                                                                              1⤵
                                                                                                                                                                PID:6812
                                                                                                                                                              • C:\Windows\System32\rundll32.exe
                                                                                                                                                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:1396
                                                                                                                                                                • C:\Windows\System32\rundll32.exe
                                                                                                                                                                  C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {9BA05972-F6A8-11CF-A442-00A0C90A8F39} -Embedding
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:6920

                                                                                                                                                                  Network

                                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                                  Replay Monitor

                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                  Downloads

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\ActiveSkin.ocx

                                                                                                                                                                    Filesize

                                                                                                                                                                    336KB

                                                                                                                                                                    MD5

                                                                                                                                                                    3d225d8435666c14addf17c14806c355

                                                                                                                                                                    SHA1

                                                                                                                                                                    262a951a98dd9429558ed35f423babe1a6cce094

                                                                                                                                                                    SHA256

                                                                                                                                                                    2c8f92dc16cbf13542ddd3bf0a947cf84b00fed83a7124b830ddefa92f939877

                                                                                                                                                                    SHA512

                                                                                                                                                                    391df24c6427b4011e7d61b644953810e392525743914413c2e8cf5fce4a593a831cfab489fbb9517b6c0e7ef0483efb8aeaad0a18543f0da49fa3125ec971e1

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\Bonzi's Beach Checkers.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    7.8MB

                                                                                                                                                                    MD5

                                                                                                                                                                    c3b0a56e48bad8763e93653902fc7ccb

                                                                                                                                                                    SHA1

                                                                                                                                                                    d7048dcf310a293eae23932d4e865c44f6817a45

                                                                                                                                                                    SHA256

                                                                                                                                                                    821a16b65f68e745492419ea694f363926669ac16f6b470ed59fe5a3f1856fcb

                                                                                                                                                                    SHA512

                                                                                                                                                                    ae35f88623418e4c9645b545ec9e8837e54d879641658996ca21546f384e3e1f90dae992768309ac0bd2aae90e1043663931d2ef64ac541977af889ee72e721a

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\BonziBDY_2.EXE

                                                                                                                                                                    Filesize

                                                                                                                                                                    796KB

                                                                                                                                                                    MD5

                                                                                                                                                                    8a30bd00d45a659e6e393915e5aef701

                                                                                                                                                                    SHA1

                                                                                                                                                                    b00c31de44328dd71a70f0c8e123b56934edc755

                                                                                                                                                                    SHA256

                                                                                                                                                                    1e2994763a7674a0f1ec117dae562b05b614937ff61c83b316b135afab02d45a

                                                                                                                                                                    SHA512

                                                                                                                                                                    daf92e61e75382e1da0e2aba9466a9e4d9703a129a147f0b3c71755f491c68f89ad67cfb4dd013580063d664b69c8673fb52c02d34b86d947e9f16072b7090fb

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\BonziBDY_35.EXE

                                                                                                                                                                    Filesize

                                                                                                                                                                    2.5MB

                                                                                                                                                                    MD5

                                                                                                                                                                    73feeab1c303db39cbe35672ae049911

                                                                                                                                                                    SHA1

                                                                                                                                                                    c14ce70e1b3530811a8c363d246eb43fc77b656c

                                                                                                                                                                    SHA256

                                                                                                                                                                    88c03817ae8dfc5fc9e6ffd1cfb5b829924988d01cd472c1e64952c5398866e8

                                                                                                                                                                    SHA512

                                                                                                                                                                    73f37dee83664ce31522f732bf819ed157865a2a551a656a7a65d487c359a16c82bd74acff2b7a728bb5f52d53f4cfbea5bef36118128b0d416fa835053f7153

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\BonziBDY_4.EXE

                                                                                                                                                                    Filesize

                                                                                                                                                                    3.2MB

                                                                                                                                                                    MD5

                                                                                                                                                                    93f3ed21ad49fd54f249d0d536981a88

                                                                                                                                                                    SHA1

                                                                                                                                                                    ffca7f3846e538be9c6da1e871724dd935755542

                                                                                                                                                                    SHA256

                                                                                                                                                                    5678fd744faddb30a87568ae309066ef88102a274fff62f10e4963350da373bc

                                                                                                                                                                    SHA512

                                                                                                                                                                    7923556c6d6feb4ff4253e853bae3675184eab9b8ce4d4e07f356c8624317801ee807ad5340690196a975824ea3ed500ce6a80c7670f19785139be594fa5e70f

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\BonziCheckers.ocx

                                                                                                                                                                    Filesize

                                                                                                                                                                    152KB

                                                                                                                                                                    MD5

                                                                                                                                                                    66551c972574f86087032467aa6febb4

                                                                                                                                                                    SHA1

                                                                                                                                                                    5ad1fe1587a0c31bb74af20d09a1c7d3193ec3c9

                                                                                                                                                                    SHA256

                                                                                                                                                                    9028075603c66ca2e906ecac3275e289d8857411a288c992e8eef793ed71a75b

                                                                                                                                                                    SHA512

                                                                                                                                                                    35c1f500e69cdd12ec6a3c5daef737a3b57b48a44df6c120a0504d340e0f721d34121595ed396dc466a8f9952a51395912d9e141ad013000f5acb138b2d41089

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Internet\page17.jpg

                                                                                                                                                                    Filesize

                                                                                                                                                                    50KB

                                                                                                                                                                    MD5

                                                                                                                                                                    e8f52918072e96bb5f4c573dbb76d74f

                                                                                                                                                                    SHA1

                                                                                                                                                                    ba0a89ed469de5e36bd4576591ee94db2c7f8909

                                                                                                                                                                    SHA256

                                                                                                                                                                    473a890da22defb3fbd643246b3fa0d6d34939ac469cd4f48054ee2a0bc33d82

                                                                                                                                                                    SHA512

                                                                                                                                                                    d57dd0a9686696487d268ef2be2ec2d3b97baedf797a63676da5a8a4165cda89540ec2d3b9e595397cbf53e69dcce76f7249f5eeff041947146ca7bf4099819f

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\Books\Bonzi and the Internet\page18.jpg

                                                                                                                                                                    Filesize

                                                                                                                                                                    45KB

                                                                                                                                                                    MD5

                                                                                                                                                                    108fd5475c19f16c28068f67fc80f305

                                                                                                                                                                    SHA1

                                                                                                                                                                    4e1980ba338133a6fadd5fda4ffe6d4e8a039033

                                                                                                                                                                    SHA256

                                                                                                                                                                    03f269cd40809d7ec94f5fa4fff1033a624e849179962693cdc2c37d7904233b

                                                                                                                                                                    SHA512

                                                                                                                                                                    98c8743b5af89ec0072b70de8a0babfb5aff19bafa780d6ce99c83721b65a80ec310a4fe9db29a4bb50c2454c34de62c029a83b70d0a9df9b180159ea6cad83a

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\MSCOMCTL.OCX

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.0MB

                                                                                                                                                                    MD5

                                                                                                                                                                    12c2755d14b2e51a4bb5cbdfc22ecb11

                                                                                                                                                                    SHA1

                                                                                                                                                                    33f0f5962dbe0e518fe101fa985158d760f01df1

                                                                                                                                                                    SHA256

                                                                                                                                                                    3b6ccdb560d7cd4748e992bd82c799acd1bbcfc922a13830ca381d976ffcccaf

                                                                                                                                                                    SHA512

                                                                                                                                                                    4c9b16fb4d787145f6d65a34e1c4d5c6eb07bff4c313a35f5efa9dce5a840c1da77338c92346b1ad68eeb59ef37ef18a9d6078673c3543656961e656466699cf

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\MSINET.OCX

                                                                                                                                                                    Filesize

                                                                                                                                                                    112KB

                                                                                                                                                                    MD5

                                                                                                                                                                    7bec181a21753498b6bd001c42a42722

                                                                                                                                                                    SHA1

                                                                                                                                                                    3249f233657dc66632c0539c47895bfcee5770cc

                                                                                                                                                                    SHA256

                                                                                                                                                                    73da54b69911bdd08ea8bbbd508f815ef7cfa59c4684d75c1c602252ec88ee31

                                                                                                                                                                    SHA512

                                                                                                                                                                    d671e25ae5e02a55f444d253f0e4a42af6a5362d9759fb243ad6d2c333976ab3e98669621ec0850ad915ee06acbe8e70d77b084128fc275462223f4f5ab401bc

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\MSWINSCK.OCX

                                                                                                                                                                    Filesize

                                                                                                                                                                    105KB

                                                                                                                                                                    MD5

                                                                                                                                                                    9484c04258830aa3c2f2a70eb041414c

                                                                                                                                                                    SHA1

                                                                                                                                                                    b242a4fb0e9dcf14cb51dc36027baff9a79cb823

                                                                                                                                                                    SHA256

                                                                                                                                                                    bf7e47c16d7e1c0e88534f4ef95e09d0fd821ed1a06b0d95a389b35364b63ff5

                                                                                                                                                                    SHA512

                                                                                                                                                                    9d0e9f0d88594746ba41ea4a61a53498619eda596e12d8ec37d01cfe8ceb08be13e3727c83d630a6d9e6d03066f62444bb94ea5a0d2ed9d21a270e612db532a0

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\Reg.nbd

                                                                                                                                                                    Filesize

                                                                                                                                                                    140B

                                                                                                                                                                    MD5

                                                                                                                                                                    a8ed45f8bfdc5303b7b52ae2cce03a14

                                                                                                                                                                    SHA1

                                                                                                                                                                    fb9bee69ef99797ac15ba4d8a57988754f2c0c6b

                                                                                                                                                                    SHA256

                                                                                                                                                                    375ecd89ee18d7f318cf73b34a4e15b9eb16bc9d825c165e103db392f4b2a68b

                                                                                                                                                                    SHA512

                                                                                                                                                                    37917594f22d2a27b3541a666933c115813e9b34088eaeb3d74f77da79864f7d140094dfac5863778acf12f87ccda7f7255b7975066230911966b52986da2d5c

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\Reg.nbd

                                                                                                                                                                    Filesize

                                                                                                                                                                    99B

                                                                                                                                                                    MD5

                                                                                                                                                                    4de674e08ea9abd1273dde18b1197621

                                                                                                                                                                    SHA1

                                                                                                                                                                    7592a51cf654f0438f8947b5a2362c7053689fd8

                                                                                                                                                                    SHA256

                                                                                                                                                                    56010f4c8f146425eb326c79cbad23367301e6a3bc1e91fdcd671ce9f5fc4b63

                                                                                                                                                                    SHA512

                                                                                                                                                                    976d5772c2b42616cf948f215a78fa47d8154798abf1148f7f750545ed3de9ec1ecdf2e7e16b99c1459e5519a81301b9c1e6864e992a807b78257f0abaecc4c8

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\Regicon.ocx

                                                                                                                                                                    Filesize

                                                                                                                                                                    76KB

                                                                                                                                                                    MD5

                                                                                                                                                                    32ff40a65ab92beb59102b5eaa083907

                                                                                                                                                                    SHA1

                                                                                                                                                                    af2824feb55fb10ec14ebd604809a0d424d49442

                                                                                                                                                                    SHA256

                                                                                                                                                                    07e91d8ed149d5cd6d48403268a773c664367bce707a99e51220e477fddeeb42

                                                                                                                                                                    SHA512

                                                                                                                                                                    2cfc5c6cb4677ff61ec3b6e4ef8b8b7f1775cbe53b245d321c25cfec363b5b4975a53e26ef438e07a4a5b08ad1dde1387970d57d1837e653d03aef19a17d2b43

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\Runtimes\CheckRuntimes.bat

                                                                                                                                                                    Filesize

                                                                                                                                                                    279B

                                                                                                                                                                    MD5

                                                                                                                                                                    4877f2ce2833f1356ae3b534fce1b5e3

                                                                                                                                                                    SHA1

                                                                                                                                                                    7365c9ef5997324b73b1ff0ea67375a328a9646a

                                                                                                                                                                    SHA256

                                                                                                                                                                    8ae1ed38bc650db8b14291e1b7298ee7580b31e15f8a6a84f78f048a542742ff

                                                                                                                                                                    SHA512

                                                                                                                                                                    dd43ede5c3f95543bcc8086ec8209a27aadf1b61543c8ee1bb3eab9bc35b92c464e4132b228b12b244fb9625a45f5d4689a45761c4c5263aa919564664860c5e

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\Runtimes\MSAGENT.EXE

                                                                                                                                                                    Filesize

                                                                                                                                                                    391KB

                                                                                                                                                                    MD5

                                                                                                                                                                    66996a076065ebdcdac85ff9637ceae0

                                                                                                                                                                    SHA1

                                                                                                                                                                    4a25632b66a9d30239a1a77c7e7ba81bb3aee9ce

                                                                                                                                                                    SHA256

                                                                                                                                                                    16ca09ad70561f413376ad72550ae5664c89c6a76c85c872ffe2cb1e7f49e2aa

                                                                                                                                                                    SHA512

                                                                                                                                                                    e42050e799cbee5aa4f60d4e2f42aae656ff98af0548308c8d7f0d681474a9da3ad7e89694670449cdfde30ebe2c47006fbdc57cfb6b357c82731aeebc50901c

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\Runtimes\tv_enua.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    997KB

                                                                                                                                                                    MD5

                                                                                                                                                                    3f8f18c9c732151dcdd8e1d8fe655896

                                                                                                                                                                    SHA1

                                                                                                                                                                    222cc49201aa06313d4d35a62c5d494af49d1a56

                                                                                                                                                                    SHA256

                                                                                                                                                                    709936902951fb684d0a03a561fb7fd41c5e6f81ecd60d326809db66eb659331

                                                                                                                                                                    SHA512

                                                                                                                                                                    398a83f030824011f102dbcf9b25d3ff7527c489df149e9acdb492602941409cf551d16f6f03c01bc6f63a2e94645ed1f36610bdaffc7891299a8d9f89c511f7

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\SSCALA32.OCX

                                                                                                                                                                    Filesize

                                                                                                                                                                    472KB

                                                                                                                                                                    MD5

                                                                                                                                                                    ce9216b52ded7e6fc63a50584b55a9b3

                                                                                                                                                                    SHA1

                                                                                                                                                                    27bb8882b228725e2a3793b4b4da3e154d6bb2ea

                                                                                                                                                                    SHA256

                                                                                                                                                                    8e52ef01139dc448d1efd33d1d9532f852a74d05ee87e8e93c2bb0286a864e13

                                                                                                                                                                    SHA512

                                                                                                                                                                    444946e5fc3ea33dd4a09b4cbf2d41f52d584eb5b620f5e144de9a79186e2c9d322d6076ed28b6f0f6d0df9ef4f7303e3901ff552ed086b70b6815abdfc23af7

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\SSCALB32.OCX

                                                                                                                                                                    Filesize

                                                                                                                                                                    320KB

                                                                                                                                                                    MD5

                                                                                                                                                                    97ffaf46f04982c4bdb8464397ba2a23

                                                                                                                                                                    SHA1

                                                                                                                                                                    f32e89d9651fd6e3af4844fd7616a7f263dc5510

                                                                                                                                                                    SHA256

                                                                                                                                                                    5db33895923b7af9769ca08470d0462ed78eec432a4022ff0acc24fa2d4666e1

                                                                                                                                                                    SHA512

                                                                                                                                                                    8c43872396f5dceb4ba153622665e21a9b52a087987eab523b1041031e294687012d7bf88a3da7998172010eae5f4cc577099980ecd6b75751e35cfc549de002

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\Uninstall.exe

                                                                                                                                                                    Filesize

                                                                                                                                                                    65KB

                                                                                                                                                                    MD5

                                                                                                                                                                    578bebe744818e3a66c506610b99d6c3

                                                                                                                                                                    SHA1

                                                                                                                                                                    af2bc75a6037a4581979d89431bd3f7c0f0f1b1f

                                                                                                                                                                    SHA256

                                                                                                                                                                    465839938f2baec7d66dbc3f2352f6032825618a18c9c0f9333d13af6af39f71

                                                                                                                                                                    SHA512

                                                                                                                                                                    d24fcd2f3e618380cf25b2fd905f4e04c8152ee41aeee58d21abfc4af2c6a5d122f12b99ef325e1e82b2871e4e8f50715cc1fc2efcf6c4f32a3436c32727cd36

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\ssa3d30.ocx

                                                                                                                                                                    Filesize

                                                                                                                                                                    320KB

                                                                                                                                                                    MD5

                                                                                                                                                                    48c35ed0a09855b29d43f11485f8423b

                                                                                                                                                                    SHA1

                                                                                                                                                                    46716282cc5e0f66cb96057e165fa4d8d60fbae2

                                                                                                                                                                    SHA256

                                                                                                                                                                    7a0418b76d00665a71d13a30d838c3e086304bacd10d764650d2a5d2ec691008

                                                                                                                                                                    SHA512

                                                                                                                                                                    779938ec9b0f33f4cbd5f1617bea7925c1b6d794e311737605e12cd7efa5a14bbc48bee85208651cf442b84133be26c4cc8a425d0a3b5b6ad2dc27227f524a99

                                                                                                                                                                  • C:\Program Files (x86)\BonziBuddy432\sstabs2.ocx

                                                                                                                                                                    Filesize

                                                                                                                                                                    288KB

                                                                                                                                                                    MD5

                                                                                                                                                                    7303efb737685169328287a7e9449ab7

                                                                                                                                                                    SHA1

                                                                                                                                                                    47bfe724a9f71d40b5e56811ec2c688c944f3ce7

                                                                                                                                                                    SHA256

                                                                                                                                                                    596f3235642c9c968650194065850ecb02c8c524d2bdcaf6341a01201e0d69be

                                                                                                                                                                    SHA512

                                                                                                                                                                    e0d9cb9833725e0cdc7720e9d00859d93fc51a26470f01a0c08c10fa940ed23df360e093861cf85055b8a588bb2cac872d1be69844a6c754ac8ed5bfaf63eb03

                                                                                                                                                                  • C:\Recovery\WindowsRE\!WannaDecryptor!.exe.lnk

                                                                                                                                                                    Filesize

                                                                                                                                                                    590B

                                                                                                                                                                    MD5

                                                                                                                                                                    227134e2fe4626ea9aa8662807c19d64

                                                                                                                                                                    SHA1

                                                                                                                                                                    7d0f71e8d7c36befb0ca241691c3dab8bacd15af

                                                                                                                                                                    SHA256

                                                                                                                                                                    d55765b0954706e7607381b9af44b0d3903f4fb23477e92a50fdfc38b617609d

                                                                                                                                                                    SHA512

                                                                                                                                                                    67c1d300d8e749e9a472dde11c2061b9eefc18c520856b088571ad7f3747cfe96cbbf7e6186e40632d09b22c2f05912902f4e2586868729af897dfe553677264

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                    Filesize

                                                                                                                                                                    152B

                                                                                                                                                                    MD5

                                                                                                                                                                    6960857d16aadfa79d36df8ebbf0e423

                                                                                                                                                                    SHA1

                                                                                                                                                                    e1db43bd478274366621a8c6497e270d46c6ed4f

                                                                                                                                                                    SHA256

                                                                                                                                                                    f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32

                                                                                                                                                                    SHA512

                                                                                                                                                                    6deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                    Filesize

                                                                                                                                                                    152B

                                                                                                                                                                    MD5

                                                                                                                                                                    f426165d1e5f7df1b7a3758c306cd4ae

                                                                                                                                                                    SHA1

                                                                                                                                                                    59ef728fbbb5c4197600f61daec48556fec651c1

                                                                                                                                                                    SHA256

                                                                                                                                                                    b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841

                                                                                                                                                                    SHA512

                                                                                                                                                                    8d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000024

                                                                                                                                                                    Filesize

                                                                                                                                                                    62KB

                                                                                                                                                                    MD5

                                                                                                                                                                    c3c0eb5e044497577bec91b5970f6d30

                                                                                                                                                                    SHA1

                                                                                                                                                                    d833f81cf21f68d43ba64a6c28892945adc317a6

                                                                                                                                                                    SHA256

                                                                                                                                                                    eb48be34490ec9c4f9402b882166cd82cd317b51b2a49aae75cdf9ee035035eb

                                                                                                                                                                    SHA512

                                                                                                                                                                    83d3545a4ed9eed2d25f98c4c9f100ae0ac5e4bc8828dccadee38553b7633bb63222132df8ec09d32eb37d960accb76e7aab5719fc08cc0a4ef07b053f30cf38

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000025

                                                                                                                                                                    Filesize

                                                                                                                                                                    67KB

                                                                                                                                                                    MD5

                                                                                                                                                                    fb2f02c107cee2b4f2286d528d23b94e

                                                                                                                                                                    SHA1

                                                                                                                                                                    d76d6b684b7cfbe340e61734a7c197cc672b1af3

                                                                                                                                                                    SHA256

                                                                                                                                                                    925dd883d5a2eb44cf1f75e8d71346b98f14c4412a0ea0c350672384a0e83e7a

                                                                                                                                                                    SHA512

                                                                                                                                                                    be51d371b79f4cc1f860706207d5978d18660bf1dc0ca6706d43ca0375843ec924aa4a8ed44867661a77e3ec85e278c559ab6f6946cba4f43daf3854b838bb82

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000026

                                                                                                                                                                    Filesize

                                                                                                                                                                    19KB

                                                                                                                                                                    MD5

                                                                                                                                                                    76a3f1e9a452564e0f8dce6c0ee111e8

                                                                                                                                                                    SHA1

                                                                                                                                                                    11c3d925cbc1a52d53584fd8606f8f713aa59114

                                                                                                                                                                    SHA256

                                                                                                                                                                    381396157ed5e8021dd8e660142b35eb71a63aecd33062a1103ce9c709c7632c

                                                                                                                                                                    SHA512

                                                                                                                                                                    a1156a907649d6f2c3f7256405d9d5c62a626b8d4cd717fa2f29d2fbe91092a2b3fdd0716f8f31e59708fe12274bc2dea6c9ae6a413ea290e70ddf921fe7f274

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000027

                                                                                                                                                                    Filesize

                                                                                                                                                                    63KB

                                                                                                                                                                    MD5

                                                                                                                                                                    710d7637cc7e21b62fd3efe6aba1fd27

                                                                                                                                                                    SHA1

                                                                                                                                                                    8645d6b137064c7b38e10c736724e17787db6cf3

                                                                                                                                                                    SHA256

                                                                                                                                                                    c0997474b99524325dfedb5c020436e7ea9f9c9a1a759ed6daf7bdd4890bdc2b

                                                                                                                                                                    SHA512

                                                                                                                                                                    19aa77bed3c441228789cf8f931ca6194cc8d4bc7bb85d892faf5eaeda67d22c8c3b066f8ceda8169177da95a1fe111bd3436ceeaf4c784bd2bf96617f4d0c44

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00002d

                                                                                                                                                                    Filesize

                                                                                                                                                                    25KB

                                                                                                                                                                    MD5

                                                                                                                                                                    cd74fa4f0944963c0908611fed565d9b

                                                                                                                                                                    SHA1

                                                                                                                                                                    c18033d8679d742e2aab1d6c88c28bd8f8a9e10d

                                                                                                                                                                    SHA256

                                                                                                                                                                    e432edfafbd52fcdbd59ef74892aa2e2ab19df6647ae723b368fca529066a804

                                                                                                                                                                    SHA512

                                                                                                                                                                    b526216bdbc73a97db41edbec6fdfd09b7b4ae149d415fb5811dde03ad4b1b0247950abd78fef807ae47674ab1b56ff0b971fa5e305b26bc92dc07871313b750

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00002f

                                                                                                                                                                    Filesize

                                                                                                                                                                    40KB

                                                                                                                                                                    MD5

                                                                                                                                                                    3051c1e179d84292d3f84a1a0a112c80

                                                                                                                                                                    SHA1

                                                                                                                                                                    c11a63236373abfe574f2935a0e7024688b71ccb

                                                                                                                                                                    SHA256

                                                                                                                                                                    992cbdc768319cbd64c1ec740134deccbb990d29d7dccd5ecd5c49672fa98ea3

                                                                                                                                                                    SHA512

                                                                                                                                                                    df64e0f8c59b50bcffb523b6eab8fabf5f0c5c3d1abbfc6aa4831b4f6ce008320c66121dcedd124533867a9d5de83c424c5e9390bf0a95c8e641af6de74dabff

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000030

                                                                                                                                                                    Filesize

                                                                                                                                                                    53KB

                                                                                                                                                                    MD5

                                                                                                                                                                    68f0a51fa86985999964ee43de12cdd5

                                                                                                                                                                    SHA1

                                                                                                                                                                    bbfc7666be00c560b7394fa0b82b864237a99d8c

                                                                                                                                                                    SHA256

                                                                                                                                                                    f230c691e1525fac0191e2f4a1db36046306eb7d19808b7bf8227b7ed75e5a0f

                                                                                                                                                                    SHA512

                                                                                                                                                                    3049b9bd4160bfa702f2e2b6c1714c960d2c422e3481d3b6dd7006e65aa5075eed1dc9b8a2337e0501e9a7780a38718d298b2415cf30ec9e115a9360df5fa2a7

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000046

                                                                                                                                                                    Filesize

                                                                                                                                                                    215KB

                                                                                                                                                                    MD5

                                                                                                                                                                    e579aca9a74ae76669750d8879e16bf3

                                                                                                                                                                    SHA1

                                                                                                                                                                    0b8f462b46ec2b2dbaa728bea79d611411bae752

                                                                                                                                                                    SHA256

                                                                                                                                                                    6e51c7866705bf0098febfaf05cf4652f96e69ac806c837bfb1199b6e21e6aaf

                                                                                                                                                                    SHA512

                                                                                                                                                                    df22f1dff74631bc14433499d1f61609de71e425410067fd08ec193d100b70d98672228906081c309a06bcba03c097ace885240a3ce71e0da4fdb8a022fc9640

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                    Filesize

                                                                                                                                                                    1KB

                                                                                                                                                                    MD5

                                                                                                                                                                    8b1ccd3d177c993432c654e7b1d0a1b0

                                                                                                                                                                    SHA1

                                                                                                                                                                    a49fc7a5193fde73f5ad583c8c20c6d9d47f6677

                                                                                                                                                                    SHA256

                                                                                                                                                                    fbef2c10cacc3aa644ead205bb81e42638785f0f832048cfaf3b9885b46aee70

                                                                                                                                                                    SHA512

                                                                                                                                                                    f8380903fb6172a6473ce9a87dac664562500530686a0013e9605e9e456640459720c2c416bdebe34b842d13b6780e96f00b30aadac4c4465179d55778f54273

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                    Filesize

                                                                                                                                                                    7KB

                                                                                                                                                                    MD5

                                                                                                                                                                    28f08791fc5eae4f8ed25f5f1c954ce9

                                                                                                                                                                    SHA1

                                                                                                                                                                    b68cb5e01ee6dc8e9772c31299cd856d23f749ee

                                                                                                                                                                    SHA256

                                                                                                                                                                    55844a7db77ae184a0e0a7914e01d0248a3499370eadc1f24f4811d996bfb8a1

                                                                                                                                                                    SHA512

                                                                                                                                                                    45af10c06834ada94de80cad73492775bcd3cddc4c91b727cf2f658031ee4c6471b4328f0cc7a46c563762358a6c306dc54b4a987adbd4d25f4571fd3ba2915c

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                    Filesize

                                                                                                                                                                    1KB

                                                                                                                                                                    MD5

                                                                                                                                                                    dcdf6c50cfcfc3573cf19d655292cf86

                                                                                                                                                                    SHA1

                                                                                                                                                                    3fa6a00a9d717f4535a13afe068682dbaa38edbc

                                                                                                                                                                    SHA256

                                                                                                                                                                    471ca88c32872edd6ca2d1937a3a1dcd1a2a1868e42a016dc66ef3515a3722ed

                                                                                                                                                                    SHA512

                                                                                                                                                                    a9e04a872693360e5840bb875ddf7562db50113917ab88ecec5b6069b739535517d664ad065ed9cf5025643e1b0417b0cf59a1550ba6e0013b3a4d8d8db4defb

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                    Filesize

                                                                                                                                                                    5KB

                                                                                                                                                                    MD5

                                                                                                                                                                    912eb21b7cbe27ae678949f7cba85b40

                                                                                                                                                                    SHA1

                                                                                                                                                                    5fc01d43a212cfbfce8261c344b977a5f18a7b01

                                                                                                                                                                    SHA256

                                                                                                                                                                    acb123b492b5c603e53154dc50082fbe4a1aa50225e8f217038e415cd847ceb3

                                                                                                                                                                    SHA512

                                                                                                                                                                    c57af6cec17f2220bbed2b1f20f80fd1b5b5de49f9a8e632f6e4e467b5c90b462868e4318346097fc57ec45117a626eafca9c0fba3215ebacea7d99e57d89244

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT

                                                                                                                                                                    Filesize

                                                                                                                                                                    16B

                                                                                                                                                                    MD5

                                                                                                                                                                    46295cac801e5d4857d09837238a6394

                                                                                                                                                                    SHA1

                                                                                                                                                                    44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                    SHA256

                                                                                                                                                                    0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                    SHA512

                                                                                                                                                                    8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                    Filesize

                                                                                                                                                                    552B

                                                                                                                                                                    MD5

                                                                                                                                                                    f14c6f58e64968e2cce3e1d5be059fba

                                                                                                                                                                    SHA1

                                                                                                                                                                    148fc578382712dcd5bc5aaf7110b57dbfd31c50

                                                                                                                                                                    SHA256

                                                                                                                                                                    762f5403cf1e0135acb0bbf32eaeaebd197700b7be645d472c82f44ff59ac73e

                                                                                                                                                                    SHA512

                                                                                                                                                                    353f2aecd725a4a6565efd10d9c97f2591e5238aa7c292cf4bc8374cdf601d8a39ecf938fbde60f7f31d36b2429d1667cd7a8ccf2f7d6a758db729a5be825b12

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                    Filesize

                                                                                                                                                                    3KB

                                                                                                                                                                    MD5

                                                                                                                                                                    08ed76a36e2017a44b92b551864f411f

                                                                                                                                                                    SHA1

                                                                                                                                                                    08ae1a5cd78887a9cd476fbe8ba573e897ad988e

                                                                                                                                                                    SHA256

                                                                                                                                                                    f629ac3014b769d8dcef081ff6281276950fb345dc248ea93d60fcc7d6ef1e8c

                                                                                                                                                                    SHA512

                                                                                                                                                                    679cf173829de462bdbe8c87c942a9f5a3e6ad1b0ab582c754483cedbb1d3ec2612366be67b4126c7716c440a591d384ba1f2150f31c3e0597bc0c6f70b3b430

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    c9dba8868ed3d633ca962b94dd196de2

                                                                                                                                                                    SHA1

                                                                                                                                                                    7a27b9be43686563ceb2d660b4c0bfc6299d3289

                                                                                                                                                                    SHA256

                                                                                                                                                                    e69929e21e9157a48bcbb6ce2c0d5cb85884c641d3f29617d71db325d04dbbcd

                                                                                                                                                                    SHA512

                                                                                                                                                                    eb21f4d43fd63276e7433f7d758e847b837d33b19c28f60fe4228199817fc6bb1d63599f57eeb440fc21c23f291e276bcb73176873c12cc8ef2b67e3809ff901

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    32664fbeb355213c15634432836c4190

                                                                                                                                                                    SHA1

                                                                                                                                                                    2727dcb20788f37204468f5bd31c7b6c21750231

                                                                                                                                                                    SHA256

                                                                                                                                                                    117149445514d6f592c166dd27746ccc8d8aa7af65c34e3f342b2ee7cb39eb19

                                                                                                                                                                    SHA512

                                                                                                                                                                    1548946262b54a8ff0c125279bd71b810d711a9e3358ab5bb933de6e21102cec0b92bd6bd8fe6482a955da854de6a5f2c774099441983ddbeceae9acc398b64c

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                    Filesize

                                                                                                                                                                    3KB

                                                                                                                                                                    MD5

                                                                                                                                                                    7160827873bda118993acfdf950c4cab

                                                                                                                                                                    SHA1

                                                                                                                                                                    6eae005dab858d8b2a284daac435da663bea2650

                                                                                                                                                                    SHA256

                                                                                                                                                                    244b9e6b0c93614f5a5627d06741f1e499bbde8d0bd4de17b47f9fd1711a1ac3

                                                                                                                                                                    SHA512

                                                                                                                                                                    b1dd00c509d4e2f33fb274c2643f1abedfd723fbf0f7be005d026e0a693a9e76372bd0f412e3d1d20a50e3a18c4613726893c9efb0f1ad4308909c56d431f18e

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                    Filesize

                                                                                                                                                                    5KB

                                                                                                                                                                    MD5

                                                                                                                                                                    802f4ef8f078c3d2863821ad8749b652

                                                                                                                                                                    SHA1

                                                                                                                                                                    785764b1f4715204b32ee2778b331e713569cd52

                                                                                                                                                                    SHA256

                                                                                                                                                                    935ff8b99f9f41529c5fe2588fe9eadf304f863544fbee7d99c5379df0940128

                                                                                                                                                                    SHA512

                                                                                                                                                                    79a94c550c3c0b448bca5d18a41436b59f88bdead96623a7e882579a84d36b37748660df3dfdcaa5adfeb14ca3a278d77d737d847aa8adcc6bfc188128b6beeb

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                    Filesize

                                                                                                                                                                    7KB

                                                                                                                                                                    MD5

                                                                                                                                                                    407ce73f9d715137b333c5dfd0a01d34

                                                                                                                                                                    SHA1

                                                                                                                                                                    43cfa52cf222ad9ff455b855e158cb011c173a12

                                                                                                                                                                    SHA256

                                                                                                                                                                    385f817dd5ff574384807aca1c27e64b7e31311edf79e2b99e0b06c6add9bbca

                                                                                                                                                                    SHA512

                                                                                                                                                                    ea28d3e08e33dcf764f988bb836f079a39d4c76afe1af5aed69350366e9f48c063fbee64481c95977f89545ef036a284b9967f74a82f17a278881eb6c48f8f98

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                    Filesize

                                                                                                                                                                    7KB

                                                                                                                                                                    MD5

                                                                                                                                                                    263dc93fd8d11014a98f62b874aa93a9

                                                                                                                                                                    SHA1

                                                                                                                                                                    3d28ce50978108b619d85deb09b7296e946209e5

                                                                                                                                                                    SHA256

                                                                                                                                                                    9f06131304aac7c09bfb6c6e2cf21f535b11698b16272f143b0a7b6edb5aca1d

                                                                                                                                                                    SHA512

                                                                                                                                                                    2cce80c6cd6265556e58a63bc71fb7aa10738cb21b856361ac4ff9a1a57358a575ab46d1b51245e2208f46b6ec44d6854e513684375a7f72a9ada3944e7a50d4

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                    Filesize

                                                                                                                                                                    8KB

                                                                                                                                                                    MD5

                                                                                                                                                                    62130b0b1418af2bbf128f937c436995

                                                                                                                                                                    SHA1

                                                                                                                                                                    d4adc96e749b27000cc9f5bbea358217fe6066cf

                                                                                                                                                                    SHA256

                                                                                                                                                                    e747fc51be1066e6230be40755f90cb196ac0895441dd3a865853ca39e0a7f4a

                                                                                                                                                                    SHA512

                                                                                                                                                                    f9260bad2041aff5101d1a03a4a6a50f669f88c0383dceabb1b4d2228630c4f5533cce191c7ba26db905732963a61f52b096678dda6cc35f4da58c569f73f9d5

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                    Filesize

                                                                                                                                                                    7KB

                                                                                                                                                                    MD5

                                                                                                                                                                    7b94ead07a20f31b72dc1201f5aed49b

                                                                                                                                                                    SHA1

                                                                                                                                                                    91ffd9bb1e9455519706e4c57167b6b5e2551110

                                                                                                                                                                    SHA256

                                                                                                                                                                    46f4ac60dbce592a2294f2d89afc285f1250c25500b379395a6b18cd377d6656

                                                                                                                                                                    SHA512

                                                                                                                                                                    8f33dabaaf0c2f15e8154a6231ef49c0c78cae7ab19feb623e05dd8d97ce85acf2b626b94cd795feb9527beb84796db9bdcce859a5cb8f9dc8137dcda66f4118

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                    Filesize

                                                                                                                                                                    6KB

                                                                                                                                                                    MD5

                                                                                                                                                                    d260507f3a70141601cb57718d214e97

                                                                                                                                                                    SHA1

                                                                                                                                                                    9f104ecdabe1550a01a838e3ff3d6758a978755f

                                                                                                                                                                    SHA256

                                                                                                                                                                    3e80bb307f19612371a52d9906869551b4f65bd79a7c85bec7c36dba64bc255f

                                                                                                                                                                    SHA512

                                                                                                                                                                    7adcc915eb607ce59b59e223d2018d72a4f34ad8d569fb7420a8104632b954e00515c71f0f71ea344abef44be8d6bd07cfff63686e19b1a8d14d9048bca8e2fc

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                    Filesize

                                                                                                                                                                    6KB

                                                                                                                                                                    MD5

                                                                                                                                                                    1c1db4c2d95d85083bbe6186d61afd18

                                                                                                                                                                    SHA1

                                                                                                                                                                    599c77be3c5971d8fb5f51acd94f49bc6d3388d9

                                                                                                                                                                    SHA256

                                                                                                                                                                    cd49b9a9914eb35adec9a0d032d12bf78aacfc957bb05b946967b7fd391ce963

                                                                                                                                                                    SHA512

                                                                                                                                                                    0370c0d289c3eb43d25d125f77a58978072f942047c040f21608200a0089caa8bdc9f16ce57ccbb62c2952a5d084cfb54c41ddf3a6f13227144a5fed191cafc4

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                    Filesize

                                                                                                                                                                    7KB

                                                                                                                                                                    MD5

                                                                                                                                                                    46f00b91bdeda916c94eb0b2ec92c8ec

                                                                                                                                                                    SHA1

                                                                                                                                                                    91a71e32d133a89ef0fa8de0b48746a72f2c95d1

                                                                                                                                                                    SHA256

                                                                                                                                                                    768f0eb7efcc9f1c853db04522803ea1e9db182a16a2b58524c7a198b28f55b1

                                                                                                                                                                    SHA512

                                                                                                                                                                    5b6d68b0c66a665b1cb943924803007fb17e6484f45f2050a46ed5bf6ff4bb2cebae29429fc6741f3cbb9b3f213d241399bb316d50b92f4a313481d128523f40

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                    Filesize

                                                                                                                                                                    7KB

                                                                                                                                                                    MD5

                                                                                                                                                                    b6177ed81626548c34bfcf45247ee35b

                                                                                                                                                                    SHA1

                                                                                                                                                                    c09d85e6daff7270a55dc107218af74957114c72

                                                                                                                                                                    SHA256

                                                                                                                                                                    4b90c3f78cc0ed26c0ae3d55a02f212fdb5d2b7f02f9b898560e4a4a896c86bf

                                                                                                                                                                    SHA512

                                                                                                                                                                    e32d78869884da71dd7b90c908467fb2d865a875665c1b5b35b4cb906acd06e5b2729de5e268f527c475e81e39e21e9ac1e8941e251a0e198928f89ca27ab94f

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                    Filesize

                                                                                                                                                                    7KB

                                                                                                                                                                    MD5

                                                                                                                                                                    aa8b9c45c84efdc21a9ef7592d374d81

                                                                                                                                                                    SHA1

                                                                                                                                                                    b2c48550cd0e6fc2fc999dd928b7ff6ba9daa4b2

                                                                                                                                                                    SHA256

                                                                                                                                                                    99ee9b090ae391d5c697cf460c78f2597cc2793c0eab53098d5f320065e9e26e

                                                                                                                                                                    SHA512

                                                                                                                                                                    2a908ab2edc20024de7d30c4ea25424bfe7c2e5db3fc20d7779be881028f520e3adcf440b57729a7257addbd2c9a677bf5a903b739eeaed8678e21d5739e2119

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                    Filesize

                                                                                                                                                                    7KB

                                                                                                                                                                    MD5

                                                                                                                                                                    71856579c548b91158fcbd8d0dba8bdd

                                                                                                                                                                    SHA1

                                                                                                                                                                    2324e45302db5673f8bade330ed71b8d393c0172

                                                                                                                                                                    SHA256

                                                                                                                                                                    d827ac1b870a5bbbba18c5b4bf7d626155b528abba6b4f663a8f3869dd87a1d9

                                                                                                                                                                    SHA512

                                                                                                                                                                    4950b6be616eb655cdef58962c29ad0a583f2cdc92ae299e1cba3b3e671a3d00990494531ac1d35f5a415c24d20bc7ca9501acac42f935b18454f978cb468e42

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001

                                                                                                                                                                    Filesize

                                                                                                                                                                    41B

                                                                                                                                                                    MD5

                                                                                                                                                                    5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                                                                                                    SHA1

                                                                                                                                                                    d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                                                                                                    SHA256

                                                                                                                                                                    f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                                                                                                    SHA512

                                                                                                                                                                    de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                                                    Filesize

                                                                                                                                                                    96B

                                                                                                                                                                    MD5

                                                                                                                                                                    a5c6a2e34e373c3ba569d13a83576076

                                                                                                                                                                    SHA1

                                                                                                                                                                    c1ed2f84bc730073e08e394badfd56327a841e90

                                                                                                                                                                    SHA256

                                                                                                                                                                    b8eaa79632db2a8772d337a73551446d5c3bff363002b891544a005173c4a241

                                                                                                                                                                    SHA512

                                                                                                                                                                    591fcbb2210da413edac963fb6cb5baaa31d87c22173d3e266c7b19efb43f711a84cfd0e2a6bc160fe95b62852a49831fb1b084bdf49e3c6dcfd2bae47ea0394

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                                                    Filesize

                                                                                                                                                                    72B

                                                                                                                                                                    MD5

                                                                                                                                                                    2dd2cf4f07274c13d8d378b8e12b9934

                                                                                                                                                                    SHA1

                                                                                                                                                                    93c1da25995117f7428eea564be484be34f2f17a

                                                                                                                                                                    SHA256

                                                                                                                                                                    d3ab22ae1bbaed26f772ddbc6fd5f6c1e2918ba626583669f93b942f138cede5

                                                                                                                                                                    SHA512

                                                                                                                                                                    462dd6957fadfaee5fe4005ba078fad77eb74872ccf5acd5cb24bab75203da4039fac76659ed4442c7a92dfc84f77f291e1b6057c7fbdc8b8b1fe3dbd751f5f8

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57ff4f.TMP

                                                                                                                                                                    Filesize

                                                                                                                                                                    48B

                                                                                                                                                                    MD5

                                                                                                                                                                    9139583344f60f93f6a19c88a60a6f0c

                                                                                                                                                                    SHA1

                                                                                                                                                                    adbbb18b78e3917a71248eb801f5af9e07717603

                                                                                                                                                                    SHA256

                                                                                                                                                                    4670ddc1fc5aaa4a26b28cbf7a2daebb6fa9d9f6fc729f8de48d35f0bd14cf67

                                                                                                                                                                    SHA512

                                                                                                                                                                    4a4bf83c4134f7593dd3f7ac65d857a3fcde98f488a0c946ef9082c6369ac2ad5d1d304148ea38ec696ba7a52cbdd05d0432bcba61e6a0028ee9da88a4267c43

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                    Filesize

                                                                                                                                                                    3KB

                                                                                                                                                                    MD5

                                                                                                                                                                    1507f0d7286ca9305883b41d0bfe2c47

                                                                                                                                                                    SHA1

                                                                                                                                                                    3cc94750e7b9c7ce3328bac2a4091cf5af84d5cc

                                                                                                                                                                    SHA256

                                                                                                                                                                    c2183d366603b1dde210cd1e375a1c749b9d3dfe475c93431399fdf1c37031d7

                                                                                                                                                                    SHA512

                                                                                                                                                                    2765158da4ec8dc7c528cfa8e724931bce2853f9c3f48f70322d8ad469b58bc120e0ac33a5e0e16ad27ccda696cb55d64c2ed5be66342357c2f06406c853685c

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                    Filesize

                                                                                                                                                                    871B

                                                                                                                                                                    MD5

                                                                                                                                                                    6b5c3c99c1ed02ffd6e57c9bf03fbe7e

                                                                                                                                                                    SHA1

                                                                                                                                                                    ebe56efe80564b1a9c71153d316739c6491bed07

                                                                                                                                                                    SHA256

                                                                                                                                                                    bbda8ed7e8e2d44adb72da728609d2c814044decf1e229530f527db85626c389

                                                                                                                                                                    SHA512

                                                                                                                                                                    f13f5373137c28f5457faa3372dde7cb2c69bd23f97e76e82f0342a3ad8c8053e1efef91947558e1171900467a9b845478464878be40e1b63044d7f2722aceb9

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                    Filesize

                                                                                                                                                                    1KB

                                                                                                                                                                    MD5

                                                                                                                                                                    c31b70356c3029648643d7441b6b85c2

                                                                                                                                                                    SHA1

                                                                                                                                                                    20235ad7ee0004a7e0a09549b853eab94dd7cff4

                                                                                                                                                                    SHA256

                                                                                                                                                                    134ca54354d544986179c4acbc9ac24222bcc4545f4bbfbecee2a947d7a20b99

                                                                                                                                                                    SHA512

                                                                                                                                                                    eb1b6f61882fe04430e01ab41a12d4891db77d74caeea84020f30cf95ac4e902c0859fe05c04a724dc9e5dee901ca263e0dcc1ae79b8b33e1f75d2ba5cb7c6c9

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    a419a7fa8d1c84c3f47adf14742afb20

                                                                                                                                                                    SHA1

                                                                                                                                                                    e421f11cb554704a133e1dcab523d120950db54b

                                                                                                                                                                    SHA256

                                                                                                                                                                    52725540f2e807c4da0838e3664cf73552d8c6e6e4413b4c9a7df04cc7f949a7

                                                                                                                                                                    SHA512

                                                                                                                                                                    bbe6be887d4e5fdc97140f26600ccdb563d67eb445850453d916c294ef5cacb0a0005b8f8ae0ae1f24542659957f89d0ab1a39a1c0ca126e4c2ae410520ab767

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    8416a90ef2feb345de4acb730feef4ee

                                                                                                                                                                    SHA1

                                                                                                                                                                    8ae1ad8c13f9672ebd0dbfca243e141dde1481c7

                                                                                                                                                                    SHA256

                                                                                                                                                                    8eddde772cfd02d567b3ac3c336b22532647ef9a6dddeec5d9d0e186d98675fb

                                                                                                                                                                    SHA512

                                                                                                                                                                    4d881b36decbc51b533d60f21e870e892b23913add34c7c9c1b2baefbe8a2749a5b77381fdffefa48bb0a905e54be6970f8861413e3554055c18d48b24484544

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                    Filesize

                                                                                                                                                                    3KB

                                                                                                                                                                    MD5

                                                                                                                                                                    3eafa8249b9e638b72dcaf257a2ea19d

                                                                                                                                                                    SHA1

                                                                                                                                                                    2ceb1ab7a6347694db5234a274edbdbc55dd5431

                                                                                                                                                                    SHA256

                                                                                                                                                                    6ee8ab286fd6ea87c2a24bb22b96947686bd6e21bf7f956bb4810a9b58b8ea76

                                                                                                                                                                    SHA512

                                                                                                                                                                    358eb06ad3f6a1ee180147fd75c1ac35f8a3ee60135b75dd3aac93ea9ddbfbf52a660e3f4cae89c7f0db906270e6fcbc9a8fd1e6d6025e7181489f7baab287ec

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                    Filesize

                                                                                                                                                                    3KB

                                                                                                                                                                    MD5

                                                                                                                                                                    44097fca5f19008ddf13c1a3e152bf95

                                                                                                                                                                    SHA1

                                                                                                                                                                    9e600b8cfaf501f431a5eb03df8f0f21631efd50

                                                                                                                                                                    SHA256

                                                                                                                                                                    81abe047d68d724ee7d947ae83a470c32802151a51f70838e51f5b86c78d4949

                                                                                                                                                                    SHA512

                                                                                                                                                                    ace4f69ec594021aba348240816b25b501255e963a9ea9f0aa8724ac74ede934e411058e506f15a0fcaef6e999ac386f0a67e33a639632c88b8972a57650b50d

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                    Filesize

                                                                                                                                                                    703B

                                                                                                                                                                    MD5

                                                                                                                                                                    7e86481bc956ec3bc05720278443a2ce

                                                                                                                                                                    SHA1

                                                                                                                                                                    8699b00b1da60b545a3752fbfeec22e83cfa5f29

                                                                                                                                                                    SHA256

                                                                                                                                                                    33a36f78fadda153891f933ec34c950c240911cbddd5b3a6202f71a9151f9800

                                                                                                                                                                    SHA512

                                                                                                                                                                    33cf3053771785ca6a73e65cfe9e2781054dce95c572e8f18f502224e02244c4690b347f901dfc62f6fa7467fc32a8cf51c1cd153859c4786c85f4e03ae6bc06

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                    Filesize

                                                                                                                                                                    3KB

                                                                                                                                                                    MD5

                                                                                                                                                                    427b8319d3dad5671e76c493ab0cdc0e

                                                                                                                                                                    SHA1

                                                                                                                                                                    73ffb5350fb1d61b86060ddc91e243e12e8b2359

                                                                                                                                                                    SHA256

                                                                                                                                                                    3405bdc7256e63d08485405b88fe394fea12864a9d6600b6f55d0265a511abad

                                                                                                                                                                    SHA512

                                                                                                                                                                    87c573c85043c920334c94db63bba530f3cd1d733c7e622922b4b414d01f3a29f5614f9f9754f5000a10f03034bf74b1db91f9f6c157d4e2c29108ff4149521e

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    667e9c87142c391e330bc35975cfd5df

                                                                                                                                                                    SHA1

                                                                                                                                                                    c20d51ef8be6291feac901a2fa1ab26b4ccf145e

                                                                                                                                                                    SHA256

                                                                                                                                                                    b9ca753cde48736412ee6bef5f34c221c6e7ad2e198441120757e0403ec955be

                                                                                                                                                                    SHA512

                                                                                                                                                                    82c1fffc9fd3ef7dbedfc9eb26455fb2be9d558c4e27aeb2de3626462dbabcab08316e112ff845a90e7e7ad441df021867af069e50ed91dbef9500ca8fce4e53

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                    Filesize

                                                                                                                                                                    3KB

                                                                                                                                                                    MD5

                                                                                                                                                                    143fd9db1bfad447e2d3d1aa8f6daefc

                                                                                                                                                                    SHA1

                                                                                                                                                                    50ad668120d8ae8c041ad1856b98eb56b73a7533

                                                                                                                                                                    SHA256

                                                                                                                                                                    2b26002ca749694c2fd72e28e41a0164184037c5130cf8bb75fa4a2edd229848

                                                                                                                                                                    SHA512

                                                                                                                                                                    57c8a1808df167ca96e8eda93e16f887b952d823c339c62f94e96695647946fc53c60b8e85df4ba44bdd3980f60e1c09bb9a53ba311af73acac73f91964d269e

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                    Filesize

                                                                                                                                                                    3KB

                                                                                                                                                                    MD5

                                                                                                                                                                    b3bdc35fc4739c6081c1207ef000b5dc

                                                                                                                                                                    SHA1

                                                                                                                                                                    dbeeaa44950b454a6cc03517add70219b30a6ac1

                                                                                                                                                                    SHA256

                                                                                                                                                                    fa4657d53672b6b945c5332c1fc81d08becdf5e0e5860029d822d643c6a28cf6

                                                                                                                                                                    SHA512

                                                                                                                                                                    9fcc445b9278243304487a05ab8af21f18c015f36f1e650730b3b6afe0d23a996cb13f1c00a7b86dd998bfddd7639730c22ca8fb1354ca6a8305fbd4e7ee7ac4

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                    Filesize

                                                                                                                                                                    3KB

                                                                                                                                                                    MD5

                                                                                                                                                                    39f21dc844b9dc557091e276226d900f

                                                                                                                                                                    SHA1

                                                                                                                                                                    1657d17a08d4aa3e3ee697ccded5364db98c48a8

                                                                                                                                                                    SHA256

                                                                                                                                                                    dcacf936ef08ae70e92164222e6c63fb7765478a3e25fe36789d354b603fdfc2

                                                                                                                                                                    SHA512

                                                                                                                                                                    445c1223f631cbc273698c0da46a161a36e2b374ddbadddd48bfb42dac2bfb4140d5cfee09a2dde6062814a725253aa6f69382203709acb50582b58bd000cbab

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                    Filesize

                                                                                                                                                                    3KB

                                                                                                                                                                    MD5

                                                                                                                                                                    9182370207d7eaf55716abff37d05b42

                                                                                                                                                                    SHA1

                                                                                                                                                                    fe90676d558688575aa1003cdd8caec4c5d8bec6

                                                                                                                                                                    SHA256

                                                                                                                                                                    65ddde0301c5983ff0f91d54848dfd4815e89d76a8c5e370e74a86146e4590d2

                                                                                                                                                                    SHA512

                                                                                                                                                                    dc4fe674fa0d32fab98ee1159b88eaea10bac809e4c5a7aa7c0d45d01bb7f99c08f54b89d04fa5b66c978d40b7c1a7260138649a811baf043fb00128b1d74c0b

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    3307a0baa3ce16264246d6543358f43a

                                                                                                                                                                    SHA1

                                                                                                                                                                    2c8894a1a576054bd90e7b1211ee048c2b25d902

                                                                                                                                                                    SHA256

                                                                                                                                                                    2640a0d5aa886fc61a6d7a6a121c1a061c8e14b0f5554ac90046c80a7c5fdbef

                                                                                                                                                                    SHA512

                                                                                                                                                                    1683d5f82dbdbbd81134396bda57dc0b5071613a99eba60dcc6043b44bc8b80017cb41a65d6f2bffb5b30835075f06339fafb7db80718c6c9766e4938f163867

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57eb2b.TMP

                                                                                                                                                                    Filesize

                                                                                                                                                                    370B

                                                                                                                                                                    MD5

                                                                                                                                                                    79d9653e2c0f1e3a37ce2e8f2da6c6b5

                                                                                                                                                                    SHA1

                                                                                                                                                                    cc03027e311268b0ced7795de78c6a8f15c5bc53

                                                                                                                                                                    SHA256

                                                                                                                                                                    63e2f98e3c5a60146532fede122ab49c676dad8fa716871dfc226dc0d3cd3f0e

                                                                                                                                                                    SHA512

                                                                                                                                                                    6db032049b4cf3022b29476765410de20a6fbd6d90498ca0787b9399d4bf4ff31a8cdccf09a8c4a32410c26dbadfc4815abeb07e048db6fb40a6c8e88a003d6a

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                    Filesize

                                                                                                                                                                    16B

                                                                                                                                                                    MD5

                                                                                                                                                                    6752a1d65b201c13b62ea44016eb221f

                                                                                                                                                                    SHA1

                                                                                                                                                                    58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                                                                                    SHA256

                                                                                                                                                                    0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                                                                                    SHA512

                                                                                                                                                                    9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                    Filesize

                                                                                                                                                                    11KB

                                                                                                                                                                    MD5

                                                                                                                                                                    75140b6b4f80398c023bf39dbe055bb1

                                                                                                                                                                    SHA1

                                                                                                                                                                    3f232f0fab5c3a01dc3949a0241b908e58febb43

                                                                                                                                                                    SHA256

                                                                                                                                                                    0c9ff7ae7a6c329df82f8799d88a52b8f977f2a228320c0b6c1eab42c423829e

                                                                                                                                                                    SHA512

                                                                                                                                                                    c3d60a2403be747974945dd2f5f49b4f7f12eae5b1cb56f8b122508747672da205b1dd2c4edf7c65a021cc07e40e1e63787e1919225fe6c0638d85268c9d9403

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                    Filesize

                                                                                                                                                                    11KB

                                                                                                                                                                    MD5

                                                                                                                                                                    3863bd984c095ac016699fce5d0a1cc1

                                                                                                                                                                    SHA1

                                                                                                                                                                    55add5e3ec2d66c1bd0a5c38b653cd7baa1367f9

                                                                                                                                                                    SHA256

                                                                                                                                                                    558d8ac11ee5c92d68a4b55e5170224d08306cefa79efb388f95f5570922f5f6

                                                                                                                                                                    SHA512

                                                                                                                                                                    ae4eeff027afc023155aa208616c8b2a8e09734632bf3c4d2dffffd7c7fc6dbde4388203622edd06ea298b6013c06aa6a46792a42eee8067aa58a2c9b1cf1978

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                    Filesize

                                                                                                                                                                    10KB

                                                                                                                                                                    MD5

                                                                                                                                                                    0fdb129854b41d74538794acc33b34da

                                                                                                                                                                    SHA1

                                                                                                                                                                    1fbf81eb7c04b87ceb8818a16fdf763ff7f8dfe0

                                                                                                                                                                    SHA256

                                                                                                                                                                    d3ac707550a693e1d98ed638d69dbc5da91f240ca5e3cbf6ee8cff3221dce69c

                                                                                                                                                                    SHA512

                                                                                                                                                                    ded4028937a876a02474ea8e3bb6b95fffdc9d1384e233e832e43ae6801f70d51f9706f4253246c378098341eb83d8e1d31ff3396b8b1120181a2550ce7771d4

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                    Filesize

                                                                                                                                                                    11KB

                                                                                                                                                                    MD5

                                                                                                                                                                    36fb2b9feb2f4290032d58ad08926cc6

                                                                                                                                                                    SHA1

                                                                                                                                                                    d49c9bf1da2f38a8fd8e609297d2bb2c56bc90a6

                                                                                                                                                                    SHA256

                                                                                                                                                                    2b01495f48ab76c1bec862d30a82d041d4fcf790507af6c7210c1c5ac0f9fb68

                                                                                                                                                                    SHA512

                                                                                                                                                                    84f54fc379b62502b3eaac5bd424d138d78b8b0d42ffeebee28bfa299a9f5c07eb29fa4cbe70f053ed8be5237dad9a1898047cbe16257277ef783a9371a8fbb3

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                    Filesize

                                                                                                                                                                    11KB

                                                                                                                                                                    MD5

                                                                                                                                                                    aaa6341b3f203ef8b5114faabdf91976

                                                                                                                                                                    SHA1

                                                                                                                                                                    23df72c9fa21c0f1e06b40d240687681a5bc0ed2

                                                                                                                                                                    SHA256

                                                                                                                                                                    6846de4f82b4de7386ca1124d8e8589ca308858f96a088f9fbf657a4d5f46e87

                                                                                                                                                                    SHA512

                                                                                                                                                                    86e2227f8f8a0c6ed7b08bbb931bc9d113442258cb97e0eefdc5ed59eab1844bf845574b2e5ff862e8f0a29890c813d35a18f503ff33f5df1069a5cd4b01db33

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                    Filesize

                                                                                                                                                                    11KB

                                                                                                                                                                    MD5

                                                                                                                                                                    e50e74ba65c0ab81918faace07e8126a

                                                                                                                                                                    SHA1

                                                                                                                                                                    939ef6e31c4226967d672093843a968cc91b486d

                                                                                                                                                                    SHA256

                                                                                                                                                                    15dc02b085895eac8b6430878331b83ff1fb827869fdb4a178707bdfee47569d

                                                                                                                                                                    SHA512

                                                                                                                                                                    633b4df57d34c0c58f17668e4b2d51769e03fba36cdba66da6cf8d97fba60066a790cab166b7983d82664355fe5e07a451e91de52e689130d4d838efb21b51f0

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Last Active\RecoveryStore.{1371BDB0-848E-11EF-ADEA-46B98598D6FF}.dat

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                    MD5

                                                                                                                                                                    d26c7add2f88d9ac1cf8185e037660da

                                                                                                                                                                    SHA1

                                                                                                                                                                    b64838becc844b9b64f75ade97376a7eef9d41ae

                                                                                                                                                                    SHA256

                                                                                                                                                                    c70edce095c927fd3a0da645ddf5bda84dc99ccf4a5c7266d38ad738cdfe654e

                                                                                                                                                                    SHA512

                                                                                                                                                                    781c7a3456b1378cca48e8451fa261535940a9b58ed58b357b41f307d693c990366c27cb8b7bda544d67aae25f23e4181ecd4323b483650874d006e67ecc0e31

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver7079.tmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    15KB

                                                                                                                                                                    MD5

                                                                                                                                                                    1a545d0052b581fbb2ab4c52133846bc

                                                                                                                                                                    SHA1

                                                                                                                                                                    62f3266a9b9925cd6d98658b92adec673cbe3dd3

                                                                                                                                                                    SHA256

                                                                                                                                                                    557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

                                                                                                                                                                    SHA512

                                                                                                                                                                    bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\08ZTJJXR\32x32[1].png

                                                                                                                                                                    Filesize

                                                                                                                                                                    645B

                                                                                                                                                                    MD5

                                                                                                                                                                    35f7d184971b3f36aeb8517708f6c875

                                                                                                                                                                    SHA1

                                                                                                                                                                    649253ab64c658c0a7332d2b18890805076a64db

                                                                                                                                                                    SHA256

                                                                                                                                                                    7af8b686c92d5c68af9b7d04cde592505d91318936b3ae55702afdc51f1327cb

                                                                                                                                                                    SHA512

                                                                                                                                                                    38ec31ada3e5d39961dbaa62edebca41bcc8e09ddf3f1f5309ddad5316f115c6da484b28dee03785ab8e5bb7b6d7bf3fbf303a3da25e9ccc0a8431b23bc71776

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\PGH3GSHW\suggestions[1].en-US

                                                                                                                                                                    Filesize

                                                                                                                                                                    17KB

                                                                                                                                                                    MD5

                                                                                                                                                                    5a34cb996293fde2cb7a4ac89587393a

                                                                                                                                                                    SHA1

                                                                                                                                                                    3c96c993500690d1a77873cd62bc639b3a10653f

                                                                                                                                                                    SHA256

                                                                                                                                                                    c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                                                                                                                                                                    SHA512

                                                                                                                                                                    e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\TRPPE7V2\polyfills-c67a75d1b6f99dc8[1].js

                                                                                                                                                                    Filesize

                                                                                                                                                                    89KB

                                                                                                                                                                    MD5

                                                                                                                                                                    837c0df77fd5009c9e46d446188ecfd0

                                                                                                                                                                    SHA1

                                                                                                                                                                    81d34b3036ea28438bf8f3b111e69b3331f45e59

                                                                                                                                                                    SHA256

                                                                                                                                                                    0225eb034d024a03bdc90ea6c79f56193662e7c3eee909696298820e517cbb83

                                                                                                                                                                    SHA512

                                                                                                                                                                    dcf5f00351f86c1411191ccbb1a35094965c93e5f20e9b951a93589531c01c315c854db31f1cd8da2f5b6c2abbca8344d5d1465790820cc3b5c20a0aacac4b61

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\TRPPE7V2\vcd15cbe7772f49c399c6a5babf22c1241717689176015[1].js

                                                                                                                                                                    Filesize

                                                                                                                                                                    19KB

                                                                                                                                                                    MD5

                                                                                                                                                                    ec18af6d41f6f278b6aed3bdabffa7bc

                                                                                                                                                                    SHA1

                                                                                                                                                                    62c9e2cab76b888829f3c5335e91c320b22329ae

                                                                                                                                                                    SHA256

                                                                                                                                                                    8a18d13015336bc184819a5a768447462202ef3105ec511bf42ed8304a7ed94f

                                                                                                                                                                    SHA512

                                                                                                                                                                    669b0e9a545057acbdd3b4c8d1d2811eaf4c776f679da1083e591ff38ae7684467abacef5af3d4aabd9fb7c335692dbca0def63ddac2cd28d8e14e95680c3511

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\$inst\0001.tmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    8.0MB

                                                                                                                                                                    MD5

                                                                                                                                                                    8e15b605349e149d4385675afff04ebf

                                                                                                                                                                    SHA1

                                                                                                                                                                    f346a886dd4cb0fbbd2dff1a43d9dfde7fce348b

                                                                                                                                                                    SHA256

                                                                                                                                                                    803f930cdd94198bdd2e9a51aa962cc864748067373f11b2e9215404bd662cee

                                                                                                                                                                    SHA512

                                                                                                                                                                    8bf957ef72465fe103dbf83411df9082433eead022f0beccab59c9e406bbd1e4edb701fd0bc91f195312943ad1890fee34b4e734578298bb60bb81ed6fa9a46d

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\$inst\0002.tmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    8.0MB

                                                                                                                                                                    MD5

                                                                                                                                                                    596cb5d019dec2c57cda897287895614

                                                                                                                                                                    SHA1

                                                                                                                                                                    6b12ea8427fdbee9a510160ff77d5e9d6fa99dfa

                                                                                                                                                                    SHA256

                                                                                                                                                                    e1c89d9348aea185b0b0e80263c9e0bf14aa462294a5d13009363140a88df3ff

                                                                                                                                                                    SHA512

                                                                                                                                                                    8f5fc432fd2fc75e2f84d4c7d21c23dd1f78475214c761418cf13b0e043ba1e0fc28df52afd9149332a2134fe5d54abc7e8676916100e10f374ef6cdecff7a20

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\$inst\0003.tmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    8.0MB

                                                                                                                                                                    MD5

                                                                                                                                                                    7c8328586cdff4481b7f3d14659150ae

                                                                                                                                                                    SHA1

                                                                                                                                                                    b55ffa83c7d4323a08ea5fabf5e1c93666fead5c

                                                                                                                                                                    SHA256

                                                                                                                                                                    5eec15c6ed08995e4aaffa9beeeaf3d1d3a3d19f7f4890a63ddc5845930016cc

                                                                                                                                                                    SHA512

                                                                                                                                                                    aa4220217d3af263352f8b7d34bd8f27d3e2c219c673889bc759a019e3e77a313b0713fd7b88700d57913e2564d097e15ffc47e5cf8f4899ba0de75d215f661d

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\$inst\0004.tmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    8.0MB

                                                                                                                                                                    MD5

                                                                                                                                                                    4f398982d0c53a7b4d12ae83d5955cce

                                                                                                                                                                    SHA1

                                                                                                                                                                    09dc6b6b6290a3352bd39f16f2df3b03fb8a85dc

                                                                                                                                                                    SHA256

                                                                                                                                                                    fee4d861c7302f378e7ce58f4e2ead1f2143168b7ca50205952e032c451d68f2

                                                                                                                                                                    SHA512

                                                                                                                                                                    73d9f7c22cf2502654e9cd6cd5d749e85ea41ce49fd022378df1e9d07e36ae2dde81f0b9fc25210a9860032ecda64320ec0aaf431bcd6cefba286328efcfb913

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\$inst\0005.tmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    8.0MB

                                                                                                                                                                    MD5

                                                                                                                                                                    94e0d650dcf3be9ab9ea5f8554bdcb9d

                                                                                                                                                                    SHA1

                                                                                                                                                                    21e38207f5dee33152e3a61e64b88d3c5066bf49

                                                                                                                                                                    SHA256

                                                                                                                                                                    026893ba15b76f01e12f3ef540686db8f52761dcaf0f91dcdc732c10e8f6da0e

                                                                                                                                                                    SHA512

                                                                                                                                                                    039ccf6979831f692ea3b5e3c5df532f16c5cf395731864345c28938003139a167689a4e1acef1f444db1fe7fd3023680d877f132e17bf9d7b275cfc5f673ac3

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\$inst\0006.tmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.8MB

                                                                                                                                                                    MD5

                                                                                                                                                                    b3b7f6b0fb38fc4aa08f0559e42305a2

                                                                                                                                                                    SHA1

                                                                                                                                                                    a66542f84ece3b2481c43cd4c08484dc32688eaf

                                                                                                                                                                    SHA256

                                                                                                                                                                    7fb63fca12ef039ad446482e3ce38abe79bdf8fc6987763fe337e63a1e29b30b

                                                                                                                                                                    SHA512

                                                                                                                                                                    0f4156f90e34a4c26e1314fc0c43367ad61d64c8d286e25629d56823d7466f413956962e2075756a4334914d47d69e20bb9b5a5b50c46eca4ef8173c27824e6c

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\$inst\16.tmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1KB

                                                                                                                                                                    MD5

                                                                                                                                                                    38851b1e45d75c5a7489188440c23ba8

                                                                                                                                                                    SHA1

                                                                                                                                                                    ef57d1afdce578cbcf6c79e613c805e24a840285

                                                                                                                                                                    SHA256

                                                                                                                                                                    f783ade814f65f9e750acbb0bd27312cbfc86d699edfa2c77773c67094c11fc8

                                                                                                                                                                    SHA512

                                                                                                                                                                    88dc0680c9dc7b01c61ee7687fdfe95fbfcda6fb24c53ec643b5e0bfb3d8af9cf5dae098b6fcd22d3a92ce7b12a3f32862ad521b42e407de5be056dfea62135f

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\$inst\2.tmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1KB

                                                                                                                                                                    MD5

                                                                                                                                                                    4b332a1b235922a7870595abef346cb6

                                                                                                                                                                    SHA1

                                                                                                                                                                    a0a9a95768942641c0622ddf2e29624c5fecb4bb

                                                                                                                                                                    SHA256

                                                                                                                                                                    4690ea1b97998f45a2bd991085dfb08177dd074bec58a9e07b61e3ed721bedce

                                                                                                                                                                    SHA512

                                                                                                                                                                    714447bd0441587dd0c17d0af0478aea575a419a20cba07508e03785f17d7a6f46dda686f9e9462125639039b9ce526538387e8822e2705a473ae45e85f3452d

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\$inst\7.tmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    6KB

                                                                                                                                                                    MD5

                                                                                                                                                                    420aee57b5e083d256d28e45ef887adb

                                                                                                                                                                    SHA1

                                                                                                                                                                    39f58e11b68f13932217b98672c4f33adc353be8

                                                                                                                                                                    SHA256

                                                                                                                                                                    1efb1a8831f68b443a3e3a06599e914162dc1a9b1b8f9ebc8020b40b72bbfb80

                                                                                                                                                                    SHA512

                                                                                                                                                                    76ae5dbb4aa3baf1df3e5684855ece03cd7693698b993a40da579c78c4cf9ba3dc4baaf699933d4bf56eca12ea2847b02f997d5d8ab8e5f267d5f4d6634a52cc

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ADVPACK.DLL

                                                                                                                                                                    Filesize

                                                                                                                                                                    73KB

                                                                                                                                                                    MD5

                                                                                                                                                                    81e5c8596a7e4e98117f5c5143293020

                                                                                                                                                                    SHA1

                                                                                                                                                                    45b7fe0989e2df1b4dfd227f8f3b73b6b7df9081

                                                                                                                                                                    SHA256

                                                                                                                                                                    7d126ed85df9705ec4f38bd52a73b621cf64dd87a3e8f9429a569f3f82f74004

                                                                                                                                                                    SHA512

                                                                                                                                                                    05b1e9eef13f7c140eb21f6dcb705ee3aaafabe94857aa86252afa4844de231815078a72e63d43725f6074aa5fefe765feb93a6b9cd510ee067291526bb95ec6

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTANM.DLL

                                                                                                                                                                    Filesize

                                                                                                                                                                    40KB

                                                                                                                                                                    MD5

                                                                                                                                                                    48c00a7493b28139cbf197ccc8d1f9ed

                                                                                                                                                                    SHA1

                                                                                                                                                                    a25243b06d4bb83f66b7cd738e79fccf9a02b33b

                                                                                                                                                                    SHA256

                                                                                                                                                                    905cb1a15eccaa9b79926ee7cfe3629a6f1c6b24bdd6cea9ccb9ebc9eaa92ff7

                                                                                                                                                                    SHA512

                                                                                                                                                                    c0b0a410ded92adc24c0f347a57d37e7465e50310011a9d636c5224d91fbc5d103920ab5ef86f29168e325b189d2f74659f153595df10eef3a9d348bb595d830

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTCTL.DLL

                                                                                                                                                                    Filesize

                                                                                                                                                                    160KB

                                                                                                                                                                    MD5

                                                                                                                                                                    237e13b95ab37d0141cf0bc585b8db94

                                                                                                                                                                    SHA1

                                                                                                                                                                    102c6164c21de1f3e0b7d487dd5dc4c5249e0994

                                                                                                                                                                    SHA256

                                                                                                                                                                    d19b6b7c57bcee7239526339e683f62d9c2f9690947d0a446001377f0b56103a

                                                                                                                                                                    SHA512

                                                                                                                                                                    9d0a68a806be25d2eeedba8be1acc2542d44ecd8ba4d9d123543d0f7c4732e1e490bad31cad830f788c81395f6b21d5a277c0bed251c9854440a662ac36ac4cb

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTDP2.DLL

                                                                                                                                                                    Filesize

                                                                                                                                                                    60KB

                                                                                                                                                                    MD5

                                                                                                                                                                    a334bbf5f5a19b3bdb5b7f1703363981

                                                                                                                                                                    SHA1

                                                                                                                                                                    6cb50b15c0e7d9401364c0fafeef65774f5d1a2c

                                                                                                                                                                    SHA256

                                                                                                                                                                    c33beaba130f8b740dddb9980fe9012f9322ac6e94f36a6aa6086851c51b98de

                                                                                                                                                                    SHA512

                                                                                                                                                                    1fa170f643054c0957ed1257c4d7778976c59748670afa877d625aaa006325404bc17c41b47be2906dd3f1e229870d54eb7aba4a412de5adedbd5387e24abf46

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTDPV.DLL

                                                                                                                                                                    Filesize

                                                                                                                                                                    64KB

                                                                                                                                                                    MD5

                                                                                                                                                                    7c5aefb11e797129c9e90f279fbdf71b

                                                                                                                                                                    SHA1

                                                                                                                                                                    cb9d9cbfbebb5aed6810a4e424a295c27520576e

                                                                                                                                                                    SHA256

                                                                                                                                                                    394a17150b8774e507b8f368c2c248c10fce50fc43184b744e771f0e79ecafed

                                                                                                                                                                    SHA512

                                                                                                                                                                    df59a30704d62fa2d598a5824aa04b4b4298f6192a01d93d437b46c4f907c90a1bad357199c51a62beb87cd724a30af55a619baef9ecf2cba032c5290938022a

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTMPX.DLL

                                                                                                                                                                    Filesize

                                                                                                                                                                    60KB

                                                                                                                                                                    MD5

                                                                                                                                                                    4fbbaac42cf2ecb83543f262973d07c0

                                                                                                                                                                    SHA1

                                                                                                                                                                    ab1b302d7cce10443dfc14a2eba528a0431e1718

                                                                                                                                                                    SHA256

                                                                                                                                                                    6550582e41fc53b8a7ccdf9ac603216937c6ff2a28e9538610adb7e67d782ab5

                                                                                                                                                                    SHA512

                                                                                                                                                                    4146999b4bec85bcd2774ac242cb50797134e5180a3b3df627106cdfa28f61aeea75a7530094a9b408bc9699572cae8cf998108bde51b57a6690d44f0b34b69e

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTPSH.DLL

                                                                                                                                                                    Filesize

                                                                                                                                                                    36KB

                                                                                                                                                                    MD5

                                                                                                                                                                    b4ac608ebf5a8fdefa2d635e83b7c0e8

                                                                                                                                                                    SHA1

                                                                                                                                                                    d92a2861d5d1eb67ab434ff2bd0a11029b3bd9a9

                                                                                                                                                                    SHA256

                                                                                                                                                                    8414dfe399813b7426c235ba1e625bd2b5635c8140da0d0cfc947f6565fe415f

                                                                                                                                                                    SHA512

                                                                                                                                                                    2c42daade24c3ff01c551a223ee183301518357990a9cb2cc2dd7bf411b7059ff8e0bf1d1aee2d268eca58db25902a8048050bdb3cb48ae8be1e4c2631e3d9b4

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTSR.DLL

                                                                                                                                                                    Filesize

                                                                                                                                                                    60KB

                                                                                                                                                                    MD5

                                                                                                                                                                    9fafb9d0591f2be4c2a846f63d82d301

                                                                                                                                                                    SHA1

                                                                                                                                                                    1df97aa4f3722b6695eac457e207a76a6b7457be

                                                                                                                                                                    SHA256

                                                                                                                                                                    e78e74c24d468284639faf9dcfdba855f3e4f00b2f26db6b2c491fa51da8916d

                                                                                                                                                                    SHA512

                                                                                                                                                                    ac0d97833beec2010f79cb1fbdb370d3a812042957f4643657e15eed714b9117c18339c737d3fd95011f873cda46ae195a5a67ae40ff2a5bcbee54d1007f110a

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGENTSVR.EXE

                                                                                                                                                                    Filesize

                                                                                                                                                                    268KB

                                                                                                                                                                    MD5

                                                                                                                                                                    5c91bf20fe3594b81052d131db798575

                                                                                                                                                                    SHA1

                                                                                                                                                                    eab3a7a678528b5b2c60d65b61e475f1b2f45baa

                                                                                                                                                                    SHA256

                                                                                                                                                                    e8ce546196b6878a8c34da863a6c8a7e34af18fb9b509d4d36763734efa2d175

                                                                                                                                                                    SHA512

                                                                                                                                                                    face50db7025e0eb2e67c4f8ec272413d13491f7438287664593636e3c7e3accaef76c3003a299a1c5873d388b618da9eaede5a675c91f4c1f570b640ac605d6

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGT0409.DLL

                                                                                                                                                                    Filesize

                                                                                                                                                                    28KB

                                                                                                                                                                    MD5

                                                                                                                                                                    0cbf0f4c9e54d12d34cd1a772ba799e1

                                                                                                                                                                    SHA1

                                                                                                                                                                    40e55eb54394d17d2d11ca0089b84e97c19634a7

                                                                                                                                                                    SHA256

                                                                                                                                                                    6b0b57e5b27d901f4f106b236c58d0b2551b384531a8f3dad6c06ed4261424b1

                                                                                                                                                                    SHA512

                                                                                                                                                                    bfdb6e8387ffbba3b07869cb3e1c8ca0b2d3336aa474bd19a35e4e3a3a90427e49b4b45c09d8873d9954d0f42b525ed18070b949c6047f4e4cdb096f9c5ae5d5

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGT0409.HLP

                                                                                                                                                                    Filesize

                                                                                                                                                                    8KB

                                                                                                                                                                    MD5

                                                                                                                                                                    466d35e6a22924dd846a043bc7dd94b8

                                                                                                                                                                    SHA1

                                                                                                                                                                    35e5b7439e3d49cb9dc57e7ef895a3cd8d80fb10

                                                                                                                                                                    SHA256

                                                                                                                                                                    e4ccf06706e68621bb69add3dd88fed82d30ad8778a55907d33f6d093ac16801

                                                                                                                                                                    SHA512

                                                                                                                                                                    23b64ed68a8f1df4d942b5a08a6b6296ec5499a13bb48536e8426d9795771dbcef253be738bf6dc7158a5815f8dcc65feb92fadf89ea8054544bb54fc83aa247

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGT20.INF

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    e4a499b9e1fe33991dbcfb4e926c8821

                                                                                                                                                                    SHA1

                                                                                                                                                                    951d4750b05ea6a63951a7667566467d01cb2d42

                                                                                                                                                                    SHA256

                                                                                                                                                                    49e6b848f5a708d161f795157333d7e1c7103455a2f47f50895683ef6a1abe4d

                                                                                                                                                                    SHA512

                                                                                                                                                                    a291bb986293197a16f75b2473297286525ac5674c08a92c87b5cc1f0f2e62254ea27d626b30898e7857281bdb502f188c365311c99bda5c2dd76da0c82c554a

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGTCTL15.TLB

                                                                                                                                                                    Filesize

                                                                                                                                                                    28KB

                                                                                                                                                                    MD5

                                                                                                                                                                    f1656b80eaae5e5201dcbfbcd3523691

                                                                                                                                                                    SHA1

                                                                                                                                                                    6f93d71c210eb59416e31f12e4cc6a0da48de85b

                                                                                                                                                                    SHA256

                                                                                                                                                                    3f8adc1e332dd5c252bbcf92bf6079b38a74d360d94979169206db34e6a24cd2

                                                                                                                                                                    SHA512

                                                                                                                                                                    e9c216b9725bd419414155cfdd917f998aa41c463bc46a39e0c025aa030bc02a60c28ac00d03643c24472ffe20b8bbb5447c1a55ff07db3a41d6118b647a0003

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\AGTINST.INF

                                                                                                                                                                    Filesize

                                                                                                                                                                    7KB

                                                                                                                                                                    MD5

                                                                                                                                                                    b127d9187c6dbb1b948053c7c9a6811f

                                                                                                                                                                    SHA1

                                                                                                                                                                    b3073c8cad22c87dd9b8f76b6ffd0c4d0a2010d9

                                                                                                                                                                    SHA256

                                                                                                                                                                    bd1295d19d010d4866c9d6d87877913eee69e279d4d089e5756ba285f3424e00

                                                                                                                                                                    SHA512

                                                                                                                                                                    88e447dd4db40e852d77016cfd24e09063490456c1426a779d33d8a06124569e26597bb1e46a3a2bbf78d9bffee46402c41f0ceb44970d92c69002880ddc0476

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\MSLWVTTS.DLL

                                                                                                                                                                    Filesize

                                                                                                                                                                    52KB

                                                                                                                                                                    MD5

                                                                                                                                                                    316999655fef30c52c3854751c663996

                                                                                                                                                                    SHA1

                                                                                                                                                                    a7862202c3b075bdeb91c5e04fe5ff71907dae59

                                                                                                                                                                    SHA256

                                                                                                                                                                    ea4ca740cd60d2c88280ff8115bf354876478ef27e9e676d8b66601b4e900ba0

                                                                                                                                                                    SHA512

                                                                                                                                                                    5555673e9863127749fc240f09cf3fb46e2019b459ad198ba1dc356ba321c41e4295b6b2e2d67079421d7e6d2fb33542b81b0c7dae812fe8e1a87ded044edd44

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Msvcirt.dll

                                                                                                                                                                    Filesize

                                                                                                                                                                    76KB

                                                                                                                                                                    MD5

                                                                                                                                                                    e7cd26405293ee866fefdd715fc8b5e5

                                                                                                                                                                    SHA1

                                                                                                                                                                    6326412d0ea86add8355c76f09dfc5e7942f9c11

                                                                                                                                                                    SHA256

                                                                                                                                                                    647f7534aaaedffa93534e4cb9b24bfcf91524828ff0364d88973be58139e255

                                                                                                                                                                    SHA512

                                                                                                                                                                    1114c5f275ecebd5be330aa53ba24d2e7d38fc20bb3bdfa1b872288783ea87a7464d2ab032b542989dee6263499e4e93ca378f9a7d2260aebccbba7fe7f53999

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Msvcp50.dll

                                                                                                                                                                    Filesize

                                                                                                                                                                    552KB

                                                                                                                                                                    MD5

                                                                                                                                                                    497fd4a8f5c4fcdaaac1f761a92a366a

                                                                                                                                                                    SHA1

                                                                                                                                                                    81617006e93f8a171b2c47581c1d67fac463dc93

                                                                                                                                                                    SHA256

                                                                                                                                                                    91cd76f9fa3b25008decb12c005c194bdf66c8d6526a954de7051bec9aae462a

                                                                                                                                                                    SHA512

                                                                                                                                                                    73d11a309d8f1a6624520a0bf56d539cb07adee6d46f2049a86919f5ce3556dc031437f797e3296311fe780a8a11a1a37b4a404de337d009e9ed961f75664a25

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\W95INF16.DLL

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    7210d5407a2d2f52e851604666403024

                                                                                                                                                                    SHA1

                                                                                                                                                                    242fde2a7c6a3eff245f06813a2e1bdcaa9f16d9

                                                                                                                                                                    SHA256

                                                                                                                                                                    337d2fb5252fc532b7bf67476b5979d158ca2ac589e49c6810e2e1afebe296af

                                                                                                                                                                    SHA512

                                                                                                                                                                    1755a26fa018429aea00ebcc786bb41b0d6c4d26d56cd3b88d886b0c0773d863094797334e72d770635ed29b98d4c8c7f0ec717a23a22adef705a1ccf46b3f68

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\W95INF32.DLL

                                                                                                                                                                    Filesize

                                                                                                                                                                    4KB

                                                                                                                                                                    MD5

                                                                                                                                                                    4be7661c89897eaa9b28dae290c3922f

                                                                                                                                                                    SHA1

                                                                                                                                                                    4c9d25195093fea7c139167f0c5a40e13f3000f2

                                                                                                                                                                    SHA256

                                                                                                                                                                    e5e9f7c8dbd47134815e155ed1c7b261805eda6fddea6fa4ea78e0e4fb4f7fb5

                                                                                                                                                                    SHA512

                                                                                                                                                                    2035b0d35a5b72f5ea5d5d0d959e8c36fc7ac37def40fa8653c45a49434cbe5e1c73aaf144cbfbefc5f832e362b63d00fc3157ca8a1627c3c1494c13a308fc7f

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\andmoipa.ttf

                                                                                                                                                                    Filesize

                                                                                                                                                                    29KB

                                                                                                                                                                    MD5

                                                                                                                                                                    c3e8aeabd1b692a9a6c5246f8dcaa7c9

                                                                                                                                                                    SHA1

                                                                                                                                                                    4567ea5044a3cef9cb803210a70866d83535ed31

                                                                                                                                                                    SHA256

                                                                                                                                                                    38ae07eeb7909bda291d302848b8fe5f11849cf0d597f0e5b300bfed465aed4e

                                                                                                                                                                    SHA512

                                                                                                                                                                    f74218681bd9d526b68876331b22080f30507898b6a6ebdf173490ca84b696f06f4c97f894cb6052e926b1eee4b28264db1ead28f3bc9f627b4569c1ddcd2d3e

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tv_enua.dll

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.2MB

                                                                                                                                                                    MD5

                                                                                                                                                                    ed98e67fa8cc190aad0757cd620e6b77

                                                                                                                                                                    SHA1

                                                                                                                                                                    0317b10cdb8ac080ba2919e2c04058f1b6f2f94d

                                                                                                                                                                    SHA256

                                                                                                                                                                    e0beb19c3536561f603474e3d5e3c3dff341745d317bc4d1463e2abf182bb18d

                                                                                                                                                                    SHA512

                                                                                                                                                                    ec9c3a71ca9324644d4a2d458e9ba86f90deb9137d0a35793e0932c2aa297877ed7f1ab75729fda96690914e047f1336f100b6809cbc7a33baa1391ed588d7f0

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tv_enua.hlp

                                                                                                                                                                    Filesize

                                                                                                                                                                    11KB

                                                                                                                                                                    MD5

                                                                                                                                                                    80d09149ca264c93e7d810aac6411d1d

                                                                                                                                                                    SHA1

                                                                                                                                                                    96e8ddc1d257097991f9cc9aaf38c77add3d6118

                                                                                                                                                                    SHA256

                                                                                                                                                                    382d745e10944b507a8d9c69ae2e4affd4acf045729a19ac143fa8d9613ccb42

                                                                                                                                                                    SHA512

                                                                                                                                                                    8813303cd6559e2cc726921838293377e84f9b5902603dac69d93e217ff3153b82b241d51d15808641b5c4fb99613b83912e9deda9d787b4c8ccfbd6afa56bc9

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tv_enua.inf

                                                                                                                                                                    Filesize

                                                                                                                                                                    2KB

                                                                                                                                                                    MD5

                                                                                                                                                                    0a250bb34cfa851e3dd1804251c93f25

                                                                                                                                                                    SHA1

                                                                                                                                                                    c10e47a593c37dbb7226f65ad490ff65d9c73a34

                                                                                                                                                                    SHA256

                                                                                                                                                                    85189df1c141ef5d86c93b1142e65bf03db126d12d24e18b93dd4cc9f3e438ae

                                                                                                                                                                    SHA512

                                                                                                                                                                    8e056f4aa718221afab91c4307ff87db611faa51149310d990db296f979842d57c0653cb23d53fea54a69c99c4e5087a2eb37daa794ba62e6f08a8da41255795

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\tvenuax.dll

                                                                                                                                                                    Filesize

                                                                                                                                                                    40KB

                                                                                                                                                                    MD5

                                                                                                                                                                    1587bf2e99abeeae856f33bf98d3512e

                                                                                                                                                                    SHA1

                                                                                                                                                                    aa0f2a25fa5fc9edb4124e9aa906a52eb787bea9

                                                                                                                                                                    SHA256

                                                                                                                                                                    c9106198ecbd3a9cab8c2feff07f16d6bb1adfa19550148fc96076f0f28a37b0

                                                                                                                                                                    SHA512

                                                                                                                                                                    43161c65f2838aa0e8a9be5f3f73d4a6c78ad8605a6503aae16147a73f63fe985b17c17aedc3a4d0010d5216e04800d749b2625182acc84b905c344f0409765a

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmp4B0C.tmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1KB

                                                                                                                                                                    MD5

                                                                                                                                                                    d299062b01f203f7a19639f7a2ef7582

                                                                                                                                                                    SHA1

                                                                                                                                                                    8a314c999c51e9b4a78aa537b0a5deee690fea59

                                                                                                                                                                    SHA256

                                                                                                                                                                    823815d39513d1dece06c67b614900cb53ef4d40a6311ace9e7c86aa7bb2b518

                                                                                                                                                                    SHA512

                                                                                                                                                                    5672d5c10e02e4eb5f2f97ea4cc78b1f09601837bf374588eb41f2f5c9413b5c3c3c89017faae1291b20c4d620986db7eaa4ab27a7fc24429a6547508cae259a

                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\~DF9E10C3C74337035E.TMP

                                                                                                                                                                    Filesize

                                                                                                                                                                    16KB

                                                                                                                                                                    MD5

                                                                                                                                                                    0b0b406372f87ccac90c04239d01a967

                                                                                                                                                                    SHA1

                                                                                                                                                                    3155bb7a2b2791311c63f3e958692c0980470f13

                                                                                                                                                                    SHA256

                                                                                                                                                                    5376f505ab91b2690b31408aa4281e1934aec2de25590b569f861969e237f274

                                                                                                                                                                    SHA512

                                                                                                                                                                    934783f8002c111c3adcf4e7b464ceeb8b395fc1c2bf329cb6dfa52d6926112aeaac9b89fbd1ccf6d5b77e9826d1b9e94d9fd6cbf9533b39d3edaaf049585e97

                                                                                                                                                                  • C:\Users\Admin\Downloads\!Please Read Me!.txt

                                                                                                                                                                    Filesize

                                                                                                                                                                    797B

                                                                                                                                                                    MD5

                                                                                                                                                                    afa18cf4aa2660392111763fb93a8c3d

                                                                                                                                                                    SHA1

                                                                                                                                                                    c219a3654a5f41ce535a09f2a188a464c3f5baf5

                                                                                                                                                                    SHA256

                                                                                                                                                                    227082c719fd4394c1f2311a0877d8a302c5b092bcc49f853a5cf3d2945f42b0

                                                                                                                                                                    SHA512

                                                                                                                                                                    4161f250d59b7d4d4a6c4f16639d66d21b2a9606de956d22ec00bedb006643fedbbb8e4cde9f6c0c977285918648314883ca91f3442d1125593bf2605f2d5c6b

                                                                                                                                                                  • C:\Users\Admin\Downloads\Bonzi.zip

                                                                                                                                                                    Filesize

                                                                                                                                                                    49.8MB

                                                                                                                                                                    MD5

                                                                                                                                                                    65259c11e1ff8d040f9ec58524a47f02

                                                                                                                                                                    SHA1

                                                                                                                                                                    2d5a24f7cadd10140dd6d3dd0dc6d0f02c2d40fd

                                                                                                                                                                    SHA256

                                                                                                                                                                    755bd7f1fc6e93c3a69a1125dd74735895bdbac9b7cabad0506195a066bdde42

                                                                                                                                                                    SHA512

                                                                                                                                                                    37096eeb1ab0e11466c084a9ce78057e250f856b919cb9ef3920dad29b2bb2292daabbee15c64dc7bc2a48dd930a52a2fb9294943da2c1c3692863cec2bae03d

                                                                                                                                                                  • C:\Users\Admin\Downloads\Unconfirmed 131853.crdownload

                                                                                                                                                                    Filesize

                                                                                                                                                                    224KB

                                                                                                                                                                    MD5

                                                                                                                                                                    5c7fb0927db37372da25f270708103a2

                                                                                                                                                                    SHA1

                                                                                                                                                                    120ed9279d85cbfa56e5b7779ffa7162074f7a29

                                                                                                                                                                    SHA256

                                                                                                                                                                    be22645c61949ad6a077373a7d6cd85e3fae44315632f161adc4c99d5a8e6844

                                                                                                                                                                    SHA512

                                                                                                                                                                    a15f97fad744ccf5f620e5aabb81f48507327b898a9aa4287051464019e0f89224c484e9691812e166471af9beaddcfc3deb2ba878658761f4800663beef7206

                                                                                                                                                                  • C:\Users\Admin\Downloads\Unconfirmed 171960.crdownload

                                                                                                                                                                    Filesize

                                                                                                                                                                    136KB

                                                                                                                                                                    MD5

                                                                                                                                                                    70108103a53123201ceb2e921fcfe83c

                                                                                                                                                                    SHA1

                                                                                                                                                                    c71799a6a6d09ee758b04cdf90a4ab76fbd2a7e3

                                                                                                                                                                    SHA256

                                                                                                                                                                    9c3f8df80193c085912c9950c58051ae77c321975784cc069ceacd4f57d5861d

                                                                                                                                                                    SHA512

                                                                                                                                                                    996701c65eee7f781c2d22dce63f4a95900f36b97a99dcf833045bce239a08b3c2f6326b3a808431cdab92d59161dd80763e44126578e160d79b7095175d276b

                                                                                                                                                                  • C:\Users\Admin\Downloads\Unconfirmed 171960.crdownload:SmartScreen

                                                                                                                                                                    Filesize

                                                                                                                                                                    7B

                                                                                                                                                                    MD5

                                                                                                                                                                    4047530ecbc0170039e76fe1657bdb01

                                                                                                                                                                    SHA1

                                                                                                                                                                    32db7d5e662ebccdd1d71de285f907e3a1c68ac5

                                                                                                                                                                    SHA256

                                                                                                                                                                    82254025d1b98d60044d3aeb7c56eed7c61c07c3e30534d6e05dab9d6c326750

                                                                                                                                                                    SHA512

                                                                                                                                                                    8f002af3f4ed2b3dfb4ed8273318d160152da50ee4842c9f5d9915f50a3e643952494699c4258e6af993dc6e1695d0dc3db6d23f4d93c26b0bc6a20f4b4f336e

                                                                                                                                                                  • C:\Users\Admin\Downloads\Unconfirmed 458061.crdownload

                                                                                                                                                                    Filesize

                                                                                                                                                                    321KB

                                                                                                                                                                    MD5

                                                                                                                                                                    600e0dbaefc03f7bf50abb0def3fb465

                                                                                                                                                                    SHA1

                                                                                                                                                                    1b5f0ac48e06edc4ed8243be61d71077f770f2b4

                                                                                                                                                                    SHA256

                                                                                                                                                                    61e6a93f43049712b5f2d949fd233fa8015fe4bef01b9e1285d3d87b12f894f2

                                                                                                                                                                    SHA512

                                                                                                                                                                    151eebac8f8f6e72d130114f030f048dff5bce0f99ff8d3a22e8fed7616155b3e87d29acf79f488d6b53ed2c5c9b05b57f76f1f91a568c21fe9bca228efb23d9

                                                                                                                                                                  • C:\Users\Admin\Downloads\Unconfirmed 928705.crdownload

                                                                                                                                                                    Filesize

                                                                                                                                                                    5KB

                                                                                                                                                                    MD5

                                                                                                                                                                    fe537a3346590c04d81d357e3c4be6e8

                                                                                                                                                                    SHA1

                                                                                                                                                                    b1285f1d8618292e17e490857d1bdf0a79104837

                                                                                                                                                                    SHA256

                                                                                                                                                                    bbc572cced7c94d63a7208f4aba4ed20d1350bef153b099035a86c95c8d96d4a

                                                                                                                                                                    SHA512

                                                                                                                                                                    50a5c1ad99ee9f3a540cb30e87ebfdf7561f0a0ee35b3d06c394fa2bad06ca6088a04848ddcb25f449b3c98b89a91d1ba5859f1ed6737119b606968be250c8ce

                                                                                                                                                                  • C:\Users\Admin\Downloads\m.wry

                                                                                                                                                                    Filesize

                                                                                                                                                                    42KB

                                                                                                                                                                    MD5

                                                                                                                                                                    980b08bac152aff3f9b0136b616affa5

                                                                                                                                                                    SHA1

                                                                                                                                                                    2a9c9601ea038f790cc29379c79407356a3d25a3

                                                                                                                                                                    SHA256

                                                                                                                                                                    402046ada270528c9ac38bbfa0152836fe30fb8e12192354e53b8397421430d9

                                                                                                                                                                    SHA512

                                                                                                                                                                    100cda1f795781042b012498afd783fd6ff03b0068dbd07b2c2e163cd95e6c6e00755ce16b02b017693c9febc149ed02df9df9b607e2b9cca4b07e5bd420f496

                                                                                                                                                                  • C:\Users\Admin\Downloads\r.wry

                                                                                                                                                                    Filesize

                                                                                                                                                                    729B

                                                                                                                                                                    MD5

                                                                                                                                                                    880e6a619106b3def7e1255f67cb8099

                                                                                                                                                                    SHA1

                                                                                                                                                                    8b3a90b2103a92d9facbfb1f64cb0841d97b4de7

                                                                                                                                                                    SHA256

                                                                                                                                                                    c9e9dc06f500ae39bfeb4671233cc97bb6dab58d97bb94aba4a2e0e509418d35

                                                                                                                                                                    SHA512

                                                                                                                                                                    c35ca30e0131ae4ee3429610ce4914a36b681d2c406f67816f725aa336969c2996347268cb3d19c22abaa4e2740ae86f4210b872610a38b4fa09ee80fcf36243

                                                                                                                                                                  • C:\Users\Admin\Downloads\t.wry

                                                                                                                                                                    Filesize

                                                                                                                                                                    68KB

                                                                                                                                                                    MD5

                                                                                                                                                                    5557ee73699322602d9ae8294e64ce10

                                                                                                                                                                    SHA1

                                                                                                                                                                    1759643cf8bfd0fb8447fd31c5b616397c27be96

                                                                                                                                                                    SHA256

                                                                                                                                                                    a7dd727b4e0707026186fcab24ff922da50368e1a4825350bd9c4828c739a825

                                                                                                                                                                    SHA512

                                                                                                                                                                    77740de21603fe5dbb0d9971e18ec438a9df7aaa5cea6bd6ef5410e0ab38a06ce77fbaeb8fc68e0177323e6f21d0cee9410e21b7e77e8d60cc17f7d93fdb3d5e

                                                                                                                                                                  • C:\Users\Admin\Downloads\u.wry

                                                                                                                                                                    Filesize

                                                                                                                                                                    236KB

                                                                                                                                                                    MD5

                                                                                                                                                                    cf1416074cd7791ab80a18f9e7e219d9

                                                                                                                                                                    SHA1

                                                                                                                                                                    276d2ec82c518d887a8a3608e51c56fa28716ded

                                                                                                                                                                    SHA256

                                                                                                                                                                    78e3f87f31688355c0f398317b2d87d803bd87ee3656c5a7c80f0561ec8606df

                                                                                                                                                                    SHA512

                                                                                                                                                                    0bb0843a90edacaf1407e6a7273a9fbb896701635e4d9467392b7350ad25a1bec0c1ceef36737b4af5e5841936f4891436eded0533aa3d74c9a54efa42f024c5

                                                                                                                                                                  • C:\Windows\msagent\chars\Bonzi.acs

                                                                                                                                                                    Filesize

                                                                                                                                                                    5.0MB

                                                                                                                                                                    MD5

                                                                                                                                                                    1fd2907e2c74c9a908e2af5f948006b5

                                                                                                                                                                    SHA1

                                                                                                                                                                    a390e9133bfd0d55ffda07d4714af538b6d50d3d

                                                                                                                                                                    SHA256

                                                                                                                                                                    f3d4425238b5f68b4d41ed5be271d2f4118a245baf808a62dc1a9e6e619b2f95

                                                                                                                                                                    SHA512

                                                                                                                                                                    8eede3e5e52209b8703706a3e3e63230ba01975348dcdc94ef87f91d7c833a505b177139683ca7a22d8082e72e961e823bc3ad1a84ab9c371f5111f530807171

                                                                                                                                                                  • C:\Windows\msagent\chars\Peedy.acs

                                                                                                                                                                    Filesize

                                                                                                                                                                    4.0MB

                                                                                                                                                                    MD5

                                                                                                                                                                    49654a47fadfd39414ddc654da7e3879

                                                                                                                                                                    SHA1

                                                                                                                                                                    9248c10cef8b54a1d8665dfc6067253b507b73ad

                                                                                                                                                                    SHA256

                                                                                                                                                                    b8112187525051bfade06cb678390d52c79555c960202cc5bbf5901fbc0853c5

                                                                                                                                                                    SHA512

                                                                                                                                                                    fa9cab60fadd13118bf8cb2005d186eb8fa43707cb983267a314116129371d1400b95d03fbf14dfdaba8266950a90224192e40555d910cf8a3afa4aaf4a8a32f

                                                                                                                                                                  • \??\pipe\LOCAL\crashpad_2252_UYAOZQKQOZIGAWMP

                                                                                                                                                                    MD5

                                                                                                                                                                    d41d8cd98f00b204e9800998ecf8427e

                                                                                                                                                                    SHA1

                                                                                                                                                                    da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                                                                                    SHA256

                                                                                                                                                                    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                                                                                    SHA512

                                                                                                                                                                    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                                                                                                                  • memory/1948-2896-0x0000000010000000-0x0000000010012000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    72KB

                                                                                                                                                                  • memory/4948-4901-0x0000000000B10000-0x0000000000B66000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    344KB

                                                                                                                                                                  • memory/4948-4902-0x0000000005DB0000-0x0000000006354000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    5.6MB

                                                                                                                                                                  • memory/4948-4903-0x0000000005900000-0x0000000005992000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    584KB

                                                                                                                                                                  • memory/4948-4904-0x00000000058E0000-0x00000000058E8000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    32KB

                                                                                                                                                                  • memory/4948-4905-0x0000000006360000-0x00000000063FC000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    624KB

                                                                                                                                                                  • memory/4948-4906-0x0000000005C90000-0x0000000005CB8000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    160KB

                                                                                                                                                                  • memory/5384-1388-0x0000000000400000-0x0000000000424000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    144KB

                                                                                                                                                                  • memory/5384-575-0x0000000000400000-0x0000000000424000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    144KB

                                                                                                                                                                  • memory/5384-1477-0x0000000000400000-0x0000000000424000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    144KB

                                                                                                                                                                  • memory/5956-4913-0x0000000000400000-0x0000000000553000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.3MB

                                                                                                                                                                  • memory/5956-4912-0x0000000000400000-0x0000000000553000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    1.3MB

                                                                                                                                                                  • memory/6092-1588-0x0000000000400000-0x0000000000424000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    144KB

                                                                                                                                                                  • memory/6092-415-0x0000000000400000-0x0000000000424000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    144KB

                                                                                                                                                                  • memory/6092-1825-0x0000000000400000-0x0000000000424000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    144KB

                                                                                                                                                                  • memory/6092-1609-0x0000000000400000-0x0000000000424000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    144KB

                                                                                                                                                                  • memory/6140-416-0x0000000000400000-0x0000000000424000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    144KB

                                                                                                                                                                  • memory/6140-1556-0x0000000000400000-0x0000000000424000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    144KB

                                                                                                                                                                  • memory/6908-5011-0x000000002AA00000-0x000000002AA24000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    144KB

                                                                                                                                                                  • memory/6980-5009-0x000000002AA00000-0x000000002AA24000-memory.dmp

                                                                                                                                                                    Filesize

                                                                                                                                                                    144KB