Resubmissions

28-01-2025 16:58

250128-vg68tavpgw 3

28-01-2025 16:28

250128-tys7vavjd1 5

27-01-2025 16:24

250127-twh9vsxjhy 6

27-01-2025 16:23

250127-tvw5bsxpcl 1

27-01-2025 16:22

250127-tt83haxjcx 1

27-01-2025 16:16

250127-tqthmswqgx 8

27-01-2025 02:40

250127-c5ymgaxndr 10

25-01-2025 04:07

250125-epynmsvndw 4

24-01-2025 16:04

250124-th4cwawmhv 3

22-01-2025 22:00

250122-1wz1yayncr 3

Analysis

  • max time kernel
    740s
  • max time network
    742s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250113-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system
  • submitted
    14-01-2025 17:00

General

  • Target

    JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html

  • Size

    25KB

  • MD5

    1d93e8597dd860cf81cd913c4b997818

  • SHA1

    a7dacf6a32b194720a87130a16f2222c44f036eb

  • SHA256

    6514b345465786d232a61f8aca8e3b60e2bf8a3e45f237086e55caac0c19cb4d

  • SHA512

    c35592acafe20b18914ba7ee31201faa7534136df292d7c14436fb3bcbdd5f07b96b3b63897509068b8263ec4e12f55e192de027996dac8e63e08712fb891e98

  • SSDEEP

    384:PqlIcCtF4JVGTHyk9v1o99t5W9ISFaTGHx6QckT/gbpLOXguLZ:sZtSF5zg9ExLZ

Malware Config

Signatures

  • Chimera 64 IoCs

    Ransomware which infects local and network files, often distributed via Dropbox links.

  • Chimera family
  • Contacts a large (4884) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Renames multiple (3305) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Drops desktop.ini file(s) 25 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 24 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies Control Panel 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies registry class 4 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 26 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 6 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1d93e8597dd860cf81cd913c4b997818.html
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:116
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x124,0x134,0x7fffb67c46f8,0x7fffb67c4708,0x7fffb67c4718
      2⤵
        PID:4988
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:2
        2⤵
          PID:3812
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2400 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2276
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:8
          2⤵
            PID:4428
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
            2⤵
              PID:4944
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:1
              2⤵
                PID:3860
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:1
                2⤵
                  PID:3820
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:1
                  2⤵
                    PID:1948
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:1
                    2⤵
                      PID:3924
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6196 /prefetch:1
                      2⤵
                        PID:5068
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6740 /prefetch:1
                        2⤵
                          PID:32
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6756 /prefetch:1
                          2⤵
                            PID:472
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7076 /prefetch:8
                            2⤵
                              PID:972
                            • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings
                              2⤵
                                PID:2052
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff6119e5460,0x7ff6119e5470,0x7ff6119e5480
                                  3⤵
                                    PID:4388
                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7076 /prefetch:8
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:2804
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6244 /prefetch:1
                                  2⤵
                                    PID:4448
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3100 /prefetch:1
                                    2⤵
                                      PID:4932
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1936 /prefetch:1
                                      2⤵
                                        PID:4104
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6852 /prefetch:1
                                        2⤵
                                          PID:3720
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1192 /prefetch:1
                                          2⤵
                                            PID:4220
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:1
                                            2⤵
                                              PID:1064
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6880 /prefetch:1
                                              2⤵
                                                PID:1312
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1936 /prefetch:1
                                                2⤵
                                                  PID:1308
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:1
                                                  2⤵
                                                    PID:2380
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:1
                                                    2⤵
                                                      PID:964
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7288 /prefetch:1
                                                      2⤵
                                                        PID:3692
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7408 /prefetch:1
                                                        2⤵
                                                          PID:4468
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:1
                                                          2⤵
                                                            PID:5972
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=7824 /prefetch:8
                                                            2⤵
                                                              PID:5868
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6868 /prefetch:2
                                                              2⤵
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:5428
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2044,16546436239730236252,1150990404664814773,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5200 /prefetch:8
                                                              2⤵
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:5600
                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                            1⤵
                                                              PID:4796
                                                            • C:\Windows\System32\CompPkgSrv.exe
                                                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                              1⤵
                                                                PID:4576
                                                              • C:\Windows\System32\rundll32.exe
                                                                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                1⤵
                                                                  PID:3144
                                                                • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\Flasher.exe
                                                                  "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\Flasher.exe"
                                                                  1⤵
                                                                  • Chimera
                                                                  • Drops desktop.ini file(s)
                                                                  • Drops file in Program Files directory
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:5376
                                                                  • C:\Program Files\Internet Explorer\iexplore.exe
                                                                    "C:\Program Files\Internet Explorer\iexplore.exe" -k "C:\Users\Admin\Downloads\YOUR_FILES_ARE_ENCRYPTED.HTML"
                                                                    2⤵
                                                                    • Modifies Internet Explorer settings
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:2368
                                                                    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                                      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2368 CREDAT:17410 /prefetch:2
                                                                      3⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Modifies Internet Explorer settings
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:4156
                                                                • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\Flasher.exe
                                                                  "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\Flasher.exe"
                                                                  1⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  PID:5532
                                                                • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\rickroll.exe
                                                                  "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\rickroll.exe"
                                                                  1⤵
                                                                    PID:5392
                                                                  • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\WinNuke.98.exe
                                                                    "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\WinNuke.98.exe"
                                                                    1⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:5492
                                                                  • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Mabezat\Mabezat.exe
                                                                    "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Virus\Mabezat\Mabezat.exe"
                                                                    1⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:5596
                                                                  • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Net-Worm\Blaster\Blaster.E.exe
                                                                    "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Net-Worm\Blaster\Blaster.E.exe"
                                                                    1⤵
                                                                    • Adds Run key to start application
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:1100
                                                                  • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Net-Worm\Blaster\Blaster.E.exe
                                                                    "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Net-Worm\Blaster\Blaster.E.exe"
                                                                    1⤵
                                                                    • Adds Run key to start application
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:2320
                                                                  • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\Gas.exe
                                                                    "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\Gas.exe"
                                                                    1⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:3648
                                                                  • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\Whiter.a.exe
                                                                    "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\Whiter.a.exe"
                                                                    1⤵
                                                                    • Adds Run key to start application
                                                                    • Drops file in System32 directory
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:4900
                                                                    • C:\Windows\SysWOW64\notepad.exe
                                                                      notepad.exe C:\Users\Admin\AppData\Local\Temp\~sn649D.tmp
                                                                      2⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:4904
                                                                  • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\LoveYou.exe
                                                                    "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\LoveYou.exe"
                                                                    1⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:3732
                                                                  • C:\Windows\system32\OpenWith.exe
                                                                    C:\Windows\system32\OpenWith.exe -Embedding
                                                                    1⤵
                                                                    • Modifies registry class
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:5684
                                                                  • C:\Windows\System32\WScript.exe
                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\Bolbi.vbs"
                                                                    1⤵
                                                                    • Checks computer location settings
                                                                    PID:5344
                                                                    • C:\Windows\System32\wscript.exe
                                                                      "C:\Windows\System32\wscript.exe" "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\Bolbi.vbs" /elevated
                                                                      2⤵
                                                                      • Drops file in Windows directory
                                                                      • Modifies Control Panel
                                                                      • System policy modification
                                                                      PID:2764
                                                                  • C:\Windows\System32\WScript.exe
                                                                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\Bolbi.vbs"
                                                                    1⤵
                                                                    • Checks computer location settings
                                                                    PID:1312
                                                                    • C:\Windows\System32\wscript.exe
                                                                      "C:\Windows\System32\wscript.exe" "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\Bolbi.vbs" /elevated
                                                                      2⤵
                                                                      • Drops file in Windows directory
                                                                      • Modifies Control Panel
                                                                      • System policy modification
                                                                      PID:4084
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\DudleyTrojan.bat" "
                                                                    1⤵
                                                                      PID:2748
                                                                    • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
                                                                      "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\Frankenstein.doc" /o ""
                                                                      1⤵
                                                                      • Checks processor information in registry
                                                                      • Enumerates system info in registry
                                                                      • Suspicious behavior: AddClipboardFormatListener
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:3604
                                                                    • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\Gas.exe
                                                                      "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\Gas.exe"
                                                                      1⤵
                                                                        PID:3280
                                                                      • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\Hydra.exe
                                                                        "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\Hydra.exe"
                                                                        1⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:1212
                                                                      • C:\Windows\system32\OpenWith.exe
                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                        1⤵
                                                                        • Modifies registry class
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:5696
                                                                      • C:\Windows\system32\OpenWith.exe
                                                                        C:\Windows\system32\OpenWith.exe -Embedding
                                                                        1⤵
                                                                        • Modifies registry class
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:656
                                                                      • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\YouAreAnIdiot\EXEVersion\YouAreAnIdiot.exe
                                                                        "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Joke\YouAreAnIdiot\EXEVersion\YouAreAnIdiot.exe"
                                                                        1⤵
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:1136
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 1464
                                                                          2⤵
                                                                          • Program crash
                                                                          PID:780
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1136 -ip 1136
                                                                        1⤵
                                                                          PID:2400
                                                                        • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\HawkEye.exe
                                                                          "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\HawkEye.exe"
                                                                          1⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:5604
                                                                        • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\butterflyondesktop.exe
                                                                          "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\butterflyondesktop.exe"
                                                                          1⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:4544
                                                                          • C:\Users\Admin\AppData\Local\Temp\is-3QHRH.tmp\butterflyondesktop.tmp
                                                                            "C:\Users\Admin\AppData\Local\Temp\is-3QHRH.tmp\butterflyondesktop.tmp" /SL5="$1E031E,2719719,54272,C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\butterflyondesktop.exe"
                                                                            2⤵
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:2388
                                                                        • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\butterflyondesktop.exe
                                                                          "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\butterflyondesktop.exe"
                                                                          1⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:5464
                                                                          • C:\Users\Admin\AppData\Local\Temp\is-0DN32.tmp\butterflyondesktop.tmp
                                                                            "C:\Users\Admin\AppData\Local\Temp\is-0DN32.tmp\butterflyondesktop.tmp" /SL5="$204A2,2719719,54272,C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\butterflyondesktop.exe"
                                                                            2⤵
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:5604
                                                                        • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\butterflyondesktop.exe
                                                                          "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\butterflyondesktop.exe"
                                                                          1⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:5660
                                                                          • C:\Users\Admin\AppData\Local\Temp\is-8EL61.tmp\butterflyondesktop.tmp
                                                                            "C:\Users\Admin\AppData\Local\Temp\is-8EL61.tmp\butterflyondesktop.tmp" /SL5="$404A2,2719719,54272,C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\butterflyondesktop.exe"
                                                                            2⤵
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:5268
                                                                        • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\butterflyondesktop.exe
                                                                          "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\butterflyondesktop.exe"
                                                                          1⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:5892
                                                                          • C:\Users\Admin\AppData\Local\Temp\is-SR5SM.tmp\butterflyondesktop.tmp
                                                                            "C:\Users\Admin\AppData\Local\Temp\is-SR5SM.tmp\butterflyondesktop.tmp" /SL5="$5047A,2719719,54272,C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\butterflyondesktop.exe"
                                                                            2⤵
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:5424
                                                                        • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\butterflyondesktop.exe
                                                                          "C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\butterflyondesktop.exe"
                                                                          1⤵
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:6004
                                                                          • C:\Users\Admin\AppData\Local\Temp\is-060TJ.tmp\butterflyondesktop.tmp
                                                                            "C:\Users\Admin\AppData\Local\Temp\is-060TJ.tmp\butterflyondesktop.tmp" /SL5="$104D8,2719719,54272,C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Spyware\butterflyondesktop.exe"
                                                                            2⤵
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            PID:5996

                                                                        Network

                                                                        MITRE ATT&CK Enterprise v15

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\Program Files\Java\jdk-1.8\jre\lib\YOUR_FILES_ARE_ENCRYPTED.HTML

                                                                          Filesize

                                                                          4KB

                                                                          MD5

                                                                          1953df13408c84161583f0040b32eba8

                                                                          SHA1

                                                                          43d767bbd29cf99437e050e4b6ee3e1586861386

                                                                          SHA256

                                                                          eaaba78c67752895c3d49a8744f71e36e39e78c8b82fb91e06d115caf728933a

                                                                          SHA512

                                                                          8b2e2cc8f5b19d43f4bf9a3e68c67d544b7d5aae8791e17b35b06aa50f29bdf9b002e04efbcf9331f8bb39a0e3850f16beb5cdb685d74b87b438f86798fea2e4

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                          Filesize

                                                                          152B

                                                                          MD5

                                                                          d4bc32eb841f2b788106b7b5a44c13f4

                                                                          SHA1

                                                                          27868013e809484e5ac5cb21ee306b919ee0916e

                                                                          SHA256

                                                                          051cdf1896c2091e9ff822c2118fda400e2de25ee323e856bf9eb0c64c7a7257

                                                                          SHA512

                                                                          7a4963ea09832503179642ee750b1c8024373c66b4fce2bd316b782d1fc670c1c77cdb31f9316b34c78b6f3f1c99d90fb50e0500b72f4a647adf7653c44d242b

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000021

                                                                          Filesize

                                                                          20KB

                                                                          MD5

                                                                          8e7ebded7f0ce6fa732cdddb907fb249

                                                                          SHA1

                                                                          b21ad396a0d0a73e0f839d21a50664a1034253f1

                                                                          SHA256

                                                                          8213a00e8a037b13d0e30e936cf94ee04f1ad72c29a0e26cbc180bfbd3791a2b

                                                                          SHA512

                                                                          25092676fd31505bc1d81ef448a2fd6cb7124bc7ca2909486eb6b9f330a57aa1f2e9f279cab3ce3ad45327d175944a9c7ea4b843784d0139604e630d9c4c0141

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000024

                                                                          Filesize

                                                                          18KB

                                                                          MD5

                                                                          8bd66dfc42a1353c5e996cd88dc1501f

                                                                          SHA1

                                                                          dc779a25ab37913f3198eb6f8c4d89e2a05635a6

                                                                          SHA256

                                                                          ef8772f5b2cf54057e1cfb7cb2e61f09cbd20db5ee307133caf517831a5df839

                                                                          SHA512

                                                                          203a46b2d09da788614b86480d81769011c7d42e833fa33a19e99c86a987a3bd8755b89906b9fd0497a80a5cf27f1c5e795a66fe3d1c4a921667ec745ccf22f6

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000025

                                                                          Filesize

                                                                          26KB

                                                                          MD5

                                                                          73fc3bb55f1d713d2ee7dcbe4286c9e2

                                                                          SHA1

                                                                          b0042453afe2410b9439a5e7be24a64e09cf2efa

                                                                          SHA256

                                                                          60b367b229f550b08fabc0c9bbe89d8f09acd04a146f01514d48e0d03884523f

                                                                          SHA512

                                                                          d2dc495291fd3529189457ab482532026c0134b23ff50aa4417c9c7ca11c588421b655602a448515f206fa4f1e52ee67538559062263b4470abd1eccf2a1e86b

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000026

                                                                          Filesize

                                                                          18KB

                                                                          MD5

                                                                          f1dceb6be9699ca70cc78d9f43796141

                                                                          SHA1

                                                                          6b80d6b7d9b342d7921eae12478fc90a611b9372

                                                                          SHA256

                                                                          5898782f74bbdeaa5b06f660874870e1d4216bb98a7f6d9eddfbc4f7ae97d66f

                                                                          SHA512

                                                                          b02b9eba24a42caea7d408e6e4ae7ad35c2d7f163fd754b7507fc39bea5d5649e54d44b002075a6a32fca4395619286e9fb36b61736c535a91fe2d9be79048de

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000027

                                                                          Filesize

                                                                          58KB

                                                                          MD5

                                                                          7f78b5c2a13cb0e1957c2ed4f96e061d

                                                                          SHA1

                                                                          15a2c25f28c9eeca3ff99c40c484322085f97a43

                                                                          SHA256

                                                                          c8396a3769b2ba25e7ba13c72fbbddad432c434dd97e3e3302d139820407a047

                                                                          SHA512

                                                                          c404b33ae1bb881761dd1b2f16b231ccef58c4e8d798d4d70ee06b11ec8f54b79d3c65d8d22c1d7b29a60c1166b743469fb16b3d886d7d7999f8d844078db45f

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00002a

                                                                          Filesize

                                                                          87KB

                                                                          MD5

                                                                          65b0f915e780d51aa0bca6313a034f32

                                                                          SHA1

                                                                          3dd3659cfd5d3fe3adc95e447a0d23c214a3f580

                                                                          SHA256

                                                                          27f0d8282b7347ae6cd6d5a980d70020b68cace0fbe53ad32048f314a86d4f16

                                                                          SHA512

                                                                          e5af841fd4266710d181a114a10585428c1572eb0cd4538be765f9f76019a1f3ea20e594a7ee384d219a30a1d958c482f5b1920551235941eec1bcacd01e4b6f

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00002c

                                                                          Filesize

                                                                          25KB

                                                                          MD5

                                                                          2863ef4fd88221dba09a7e72dcb8225b

                                                                          SHA1

                                                                          9a7f8cfb062d8b5713d90e2b32c878b834f85a1f

                                                                          SHA256

                                                                          e193edeebafd52b8efeb11f12b4c8e6896a82f81370fdc8684072a5f75c9e13e

                                                                          SHA512

                                                                          18d3d272ee719b2c87a7ee4175bf0340a9b2b24f26e37bc1a3b5e769d5f49f870ce63de866826d9a62770a6e32a9ac656bff04b9ad8406e7d560b0d8009226ec

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00002d

                                                                          Filesize

                                                                          16KB

                                                                          MD5

                                                                          5615a54ce197eef0d5acc920e829f66f

                                                                          SHA1

                                                                          7497dded1782987092e50cada10204af8b3b5869

                                                                          SHA256

                                                                          b0ba6d78aad79eaf1ae10f20ac61d592ad800095f6472cfac490411d4ab05e26

                                                                          SHA512

                                                                          216595fb60cc9cfa6fef6475a415825b24e87854f13f2ee4484b290ac4f3e77628f56f42cb215cd8ea3f70b10eebd9bc50edeb042634777074b49c129146ef6a

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                          Filesize

                                                                          48B

                                                                          MD5

                                                                          575fe267b64c3f1765b7c19b001a3070

                                                                          SHA1

                                                                          76877fdef2525fdd0015a4624261b28f568e1e31

                                                                          SHA256

                                                                          dda7ab05c724600e142a1fe6bab0f528b87e522e0959bd0055a4ca8a307f0fb6

                                                                          SHA512

                                                                          636a1cefc216e566a6fc3afad9298891958914cc93d0b7e2f6ec29c7b004dddc9281f790e406879ca19c420965532e639b6e2a40ac3432586924b4b1c574f1f2

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                          Filesize

                                                                          168B

                                                                          MD5

                                                                          284878e1fe7a7570f108864de9744a12

                                                                          SHA1

                                                                          eb2a4ce28981af16d7cd5de1e0457012614b142f

                                                                          SHA256

                                                                          9b819f5414f68dd9b6d0bf38f08cb047c7da04803bdb5fb21d18d78b6cb13d67

                                                                          SHA512

                                                                          ca3c2e2575da11f7e95c2717787ab67605b0e77ebe43b2967c54d8fd4668a341ccf195a28220f46cb3ee5487240ab682d99b9c8d767e801f6cfe567ce610044b

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                          Filesize

                                                                          3KB

                                                                          MD5

                                                                          0733bafdf9e3b6238daaacc14965373f

                                                                          SHA1

                                                                          43606251234b77be0a71c718e0e837135763a9f1

                                                                          SHA256

                                                                          a7831571b812f20f91d3875d048feaf7d64baae29635a43fd6f6a322db9c3751

                                                                          SHA512

                                                                          11def10408219bc1ec3de4231f523f100704cad29aedcd08e318ac867a8b5f0ac93700876acd7aa683fb07edbcd0d48df1ef8e43f121bdf112ec9387f3a46b1f

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                                                          Filesize

                                                                          70KB

                                                                          MD5

                                                                          e5e3377341056643b0494b6842c0b544

                                                                          SHA1

                                                                          d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                                                          SHA256

                                                                          e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                                                          SHA512

                                                                          83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                          Filesize

                                                                          1008B

                                                                          MD5

                                                                          c59b1cf396d89811aeb2596fe4dc808b

                                                                          SHA1

                                                                          a62736c3252cfb298358d51ee84ac70eb8d31b05

                                                                          SHA256

                                                                          d9b1c8b2d922be6edb245c7ce188bfb895741a9faea8dc6643dbf68c613f1cd6

                                                                          SHA512

                                                                          8ae210bfb629a3ac2dcd76196b48dfb05c97009bedf13191caf6432fa645a272cd6c4efb4113e1206c35894256fcb44aad1cf6fb1fec95af93c825d7e81d381f

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                          Filesize

                                                                          59B

                                                                          MD5

                                                                          2800881c775077e1c4b6e06bf4676de4

                                                                          SHA1

                                                                          2873631068c8b3b9495638c865915be822442c8b

                                                                          SHA256

                                                                          226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                                                          SHA512

                                                                          e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe5828c1.TMP

                                                                          Filesize

                                                                          59B

                                                                          MD5

                                                                          78bfcecb05ed1904edce3b60cb5c7e62

                                                                          SHA1

                                                                          bf77a7461de9d41d12aa88fba056ba758793d9ce

                                                                          SHA256

                                                                          c257f929cff0e4380bf08d9f36f310753f7b1ccb5cb2ab811b52760dd8cb9572

                                                                          SHA512

                                                                          2420dff6eb853f5e1856cdab99561a896ea0743fcff3e04b37cb87eddf063770608a30c6ffb0319e5d353b0132c5f8135b7082488e425666b2c22b753a6a4d73

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                          Filesize

                                                                          6KB

                                                                          MD5

                                                                          c47e76ca8f08fce69889db21380b2ea5

                                                                          SHA1

                                                                          6b95b8d315e80cdf0fe50ad5101244b3047cab93

                                                                          SHA256

                                                                          4333756bd3077794c2d07e58978a041d064cac3348ec573504ff54f0f0e21386

                                                                          SHA512

                                                                          dd54ffcd7273eb4e80d5ea961ccd89d3830826b9488571a12f9689be562e7c16da2ea600cab7771c08599ec5a2a3fb472bdcc75660325072429a7a3faa1c6bda

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                          Filesize

                                                                          5KB

                                                                          MD5

                                                                          028d94c919cfda03f73b09739e587c4f

                                                                          SHA1

                                                                          dc47eae1b174f8e69db002a544bfc6d69b7287f2

                                                                          SHA256

                                                                          f221cef2fe8732e8b3cdc4d1be0df1124fbb02d5cb41f9b3ef7257a26b47e710

                                                                          SHA512

                                                                          7103300d39828a1b318fe1aefbbe87f9b4d1bfb4185662120cfe3e4c6dc4ca379e771c612929ef9831456a80c060cf4328f50af48bac7ae7ac17c8aba52c4bdf

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                          Filesize

                                                                          5KB

                                                                          MD5

                                                                          3cb273b844ba8a5fdaaa06bbcdbf2352

                                                                          SHA1

                                                                          edd88675ad6d02b971448702bec66ea735c171d7

                                                                          SHA256

                                                                          f5a6123ed0d7179a5e634a072c4107a6cfbbf77776bca49cb8c9846ffcd6dad4

                                                                          SHA512

                                                                          61b8e3dc34cd690c13f3a314d242d29245e8bba9ce30c7a5b0d77b3b08f9eeec7fa4ede7fd04d2d4bd91c0ab326694577023893c4eb208bc6042110db66fe106

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                          Filesize

                                                                          5KB

                                                                          MD5

                                                                          16967856719c9cbb45ee283fa2c45856

                                                                          SHA1

                                                                          75e10faf1ab4570dcce3f0bd9b6618ea9cb3f445

                                                                          SHA256

                                                                          21f53a444ed1daf5a5acf732a73a67c1327dbeb329b6f1018150f5151fa57c17

                                                                          SHA512

                                                                          72798d59c16c3c504103ae59c6774d0ab892d2277a59f47f449643549527577e7affd47735b1df170c72560982319ab5578d85033dccdc2c7af14475481d4c80

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                          Filesize

                                                                          5KB

                                                                          MD5

                                                                          3fb1fc6cdb8bb35daea031cb0ba5bc97

                                                                          SHA1

                                                                          26de01d493926ae277904fdfa0aa867c8c1e9e15

                                                                          SHA256

                                                                          3310ee4333a5809192cc05b9001151a2dfbdd6aadf338e04461c5cc0b77552c5

                                                                          SHA512

                                                                          8eaa53f2af952e4d206267a12b9b3d4c35ea06f22f0bf2cb1dc16901054546d8b911578078ce37f918f28b0850e3a82b5a50c79562d85ce0230ae346e93b1e1f

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                          Filesize

                                                                          6KB

                                                                          MD5

                                                                          dc13e3705727ad1c9b15ae283a36f7b3

                                                                          SHA1

                                                                          869b0a5ac960e77c10de655bc63f3c61f9e1444c

                                                                          SHA256

                                                                          c4c18de7af496b21492fe54a5ec987d77ec77d4155ff3e0eb956328534954ac0

                                                                          SHA512

                                                                          58f7d404e438b5d090c2368b5bd9643453ef1619fe34a9225cd88ebd3fd44ae780c3508e7b50e9751a690cefde22ba5bac397fa899ddd6db33b1f2af2bd56c8e

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                          Filesize

                                                                          24KB

                                                                          MD5

                                                                          6338e51cf2d1cb4bfea21c7d81cb3dc3

                                                                          SHA1

                                                                          0049d2863f309423d889fed141ef1f146246ac82

                                                                          SHA256

                                                                          2636a794e74289532973b8f1f9c62a0009520dad49951c956dceba846835e0ac

                                                                          SHA512

                                                                          ffcbb8f086de4ca9b51f2a86ff75f283afd9a08ba7fdfc16b119f4b80e452579fed0c7d5eb02cda11e6d7c6762ca8d5a1e542e90e106020f530d755933fb3ea2

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                          Filesize

                                                                          24KB

                                                                          MD5

                                                                          b321aef296129848c0c2c5c77ee69951

                                                                          SHA1

                                                                          402afa01ec8a6990a78514994f9648aedead5817

                                                                          SHA256

                                                                          e44d575c1dfcf221b68c84c2cf1d4f1bea45a7e32cd8010228acff6120daff1f

                                                                          SHA512

                                                                          cbb689d400fceb2f59d67e9e9d28007d2bb7562cf18f806420a9adbb08e0be5825153a44d4199ed03fc8e87311c2f5d4ab9aec5f3667984572070487475e8642

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          fc65a00228bf0f562902de594d8f159b

                                                                          SHA1

                                                                          9863f6c9a22dcb67f9c9daed0a311691127bdd1f

                                                                          SHA256

                                                                          9ca3bea7b6b295e133ca11862a8be61bc64810d88085570674fbee5c54288fec

                                                                          SHA512

                                                                          701c13f2d1c6c9572323b75dc2ccce3a48cd530f459b76e669fa2e88f328392b5f45bc02f8693984c66776f63c2686c612ea09e6aa12b40d10593affd50f7916

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          171189e7012fe31fc05ae85107750231

                                                                          SHA1

                                                                          40dcc6c6b0e2512072582923b1ecaa0986e154ae

                                                                          SHA256

                                                                          7dc1fb8a563945e90bb3911b94fee95a186ae6cea081efc2cd48705feb9f7214

                                                                          SHA512

                                                                          647279954236cedc2bb0993b4fe6727a22556818d748330b7f112d1ad1f4186251a163f3791e14a9d16da323e29b4d5363b71c6d18fd9c9f6facf145a8535034

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          82f246988aeb06272cb344143655bb3a

                                                                          SHA1

                                                                          83e24d83aef3049e088f6201675aa2c15d7fde5a

                                                                          SHA256

                                                                          b08f784dd8232a51e88b8d1572fc15b41838a24ff41d6ad00958861183854312

                                                                          SHA512

                                                                          a42c2cd3abaec978d9ef615f1e0a906c80cc3866c82bfa2e0bec9c20909b4a18d2ff7c98bcc3b13397e8bc71198bd22d43b2224797fdf8a7ebef6360a7333ed5

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe585dea.TMP

                                                                          Filesize

                                                                          536B

                                                                          MD5

                                                                          ccc199df4e51d0af93219a49a7fcb672

                                                                          SHA1

                                                                          937d3f0bccad534051f47cf510b2b72ab0c49f3c

                                                                          SHA256

                                                                          b26d7c6f0855c39a1e7cbdd97073dc88dbb5ba6db957c3c7f59d3c99f9eba574

                                                                          SHA512

                                                                          7d896ed1b09db03961f3c9955a3b2752c6b8467538afd4130a160a52f8c571d2984b003d1c0914aa2dd4cbc213bbee97926cae9e4cbc605b9b911bc103fc22a8

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                          Filesize

                                                                          16B

                                                                          MD5

                                                                          206702161f94c5cd39fadd03f4014d98

                                                                          SHA1

                                                                          bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                          SHA256

                                                                          1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                          SHA512

                                                                          0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\MANIFEST-000001

                                                                          Filesize

                                                                          41B

                                                                          MD5

                                                                          5af87dfd673ba2115e2fcf5cfdb727ab

                                                                          SHA1

                                                                          d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                          SHA256

                                                                          f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                          SHA512

                                                                          de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\shared_proto_db\metadata\CURRENT

                                                                          Filesize

                                                                          16B

                                                                          MD5

                                                                          46295cac801e5d4857d09837238a6394

                                                                          SHA1

                                                                          44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                          SHA256

                                                                          0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                          SHA512

                                                                          8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                          Filesize

                                                                          8KB

                                                                          MD5

                                                                          e3a196d06e7760846af096b3302ec027

                                                                          SHA1

                                                                          d0241491ec3d17c3f1492a5e10f68efca1169c9e

                                                                          SHA256

                                                                          19613adff4a579dc4d31fb2a99812f2bc3e2198711b22bc544f25708ef0a03d5

                                                                          SHA512

                                                                          0787f47b825da91183ea2426a146b35d0b50ea39863e381b50164b8a3ea1f1b6aeec83dc32cd2f32b479c4c29fe30cef62fcd16fa96cbd254a1b60cbfbd5d741

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                          Filesize

                                                                          11KB

                                                                          MD5

                                                                          ae8ce46663c8f762ca5c6a45f22c78fb

                                                                          SHA1

                                                                          55d53147403a88eafe97ceb83195e2c66cf29467

                                                                          SHA256

                                                                          06766f9a478db92a1263c788d4f48b023cfcd07adde65b941ae63a17fcf272b1

                                                                          SHA512

                                                                          8b39c63f6458f9d6f11b3c3fd3a40eaba9248fa136c0bc4b086419ff60a9bfe833845eb647d10187a5373e3a5b370561538190fc2c81d7c4b365fcb8ea6f2440

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\9cd93bc6dcf544bae69531052e64647ec02f2bb4.tbres

                                                                          Filesize

                                                                          4KB

                                                                          MD5

                                                                          09586df23d4ce1133c3c792f2f718c94

                                                                          SHA1

                                                                          9a99c64592638df921c8ea111d017ffe0487181c

                                                                          SHA256

                                                                          84bdf876c765fe1a858d447c2d594f06c4c2af0b2faef995a67b8038617d8c90

                                                                          SHA512

                                                                          b864260379eb24d5d26ed48a4ade9a43084e1ed64ba58b9524240cb96acbd6b2d0a3ee6708559a7d8cc1e5e22a68af18035293dba82b7f3e08eb8dd34c384121

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\e8ddd4cbd9c0504aace6ef7a13fa20d04fd52408.tbres

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          f4b2cb3b76e579aa44a2761244d05aa4

                                                                          SHA1

                                                                          59f87a2013dd1c9105c2a8a76f474a40441d88a0

                                                                          SHA256

                                                                          555987122da05c063dd3b13dba5bc39bc17957e528a2a9c46c9190c20ceeafec

                                                                          SHA512

                                                                          d878c4257fb95720ce9cbfa461356cf93f9d8dfa53a5150f305917b3534e5aa101c0f0cff98479299bf20df4209bc3ee360711f35dfccbf5ed64e207ca7e6c1b

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\1ZPTQBXU\suggestions[1].en-US

                                                                          Filesize

                                                                          17KB

                                                                          MD5

                                                                          5a34cb996293fde2cb7a4ac89587393a

                                                                          SHA1

                                                                          3c96c993500690d1a77873cd62bc639b3a10653f

                                                                          SHA256

                                                                          c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                                                                          SHA512

                                                                          e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                                                                        • C:\Users\Admin\AppData\Local\Temp\TCD3DB1.tmp\sist02.xsl

                                                                          Filesize

                                                                          245KB

                                                                          MD5

                                                                          f883b260a8d67082ea895c14bf56dd56

                                                                          SHA1

                                                                          7954565c1f243d46ad3b1e2f1baf3281451fc14b

                                                                          SHA256

                                                                          ef4835db41a485b56c2ef0ff7094bc2350460573a686182bc45fd6613480e353

                                                                          SHA512

                                                                          d95924a499f32d9b4d9a7d298502181f9e9048c21dbe0496fa3c3279b263d6f7d594b859111a99b1a53bd248ee69b867d7b1768c42e1e40934e0b990f0ce051e

                                                                        • C:\Users\Admin\AppData\Local\Temp\is-3QHRH.tmp\butterflyondesktop.tmp

                                                                          Filesize

                                                                          688KB

                                                                          MD5

                                                                          c765336f0dcf4efdcc2101eed67cd30c

                                                                          SHA1

                                                                          fa0279f59738c5aa3b6b20106e109ccd77f895a7

                                                                          SHA256

                                                                          c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28

                                                                          SHA512

                                                                          06a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891

                                                                        • C:\Users\Admin\AppData\Local\Temp\~sn649D.tmp

                                                                          Filesize

                                                                          29B

                                                                          MD5

                                                                          5eb17747397a4ee543197ef5f9969b69

                                                                          SHA1

                                                                          55bf3319521fb54f02ca7ab25e7899691be4ce70

                                                                          SHA256

                                                                          cc72e5bcb9b8c0b30d89f4615a4c6a83bb0fa2e439e939b1dc6aee2c85ea7508

                                                                          SHA512

                                                                          d0a3ea8e4b79a41b8c68d8c0bfba374e8ca094bf85784d108f0abc5e9ad63b30d28ea835a7f04dac85dcbfdfcc72604d41b71134234e34f94165edbeea8d53f6

                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat

                                                                          Filesize

                                                                          315B

                                                                          MD5

                                                                          a3b4bbe778a9eb5544e8d9a1de92bb13

                                                                          SHA1

                                                                          2b1c524f375b58eec8bf17215ea5d18d0a9aa8a4

                                                                          SHA256

                                                                          6d1f10e8a09ce2fd6d8c454a8b6ea39ed59e430c2d5d31cde4d66047eb725157

                                                                          SHA512

                                                                          37c5f042e2be1e64fe40919bc6086a9b2707b40e63ed7303b519127828cc2e54d850c6cdb5b269668e91811ed8fd8275f119143f6f22df54ed5bee48c5feb930

                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\UProof\CUSTOM.DIC

                                                                          Filesize

                                                                          16B

                                                                          MD5

                                                                          d29962abc88624befc0135579ae485ec

                                                                          SHA1

                                                                          e40a6458296ec6a2427bcb280572d023a9862b31

                                                                          SHA256

                                                                          a91a702aab9b8dd722843d3d208a21bcfa6556dfc64e2ded63975de4511eb866

                                                                          SHA512

                                                                          4311e87d8d5559248d4174908817a4ddc917bf7378114435cf12da8ccb7a1542c851812afbaf7dc106771bdb2e2d05f52e7d0c50d110fc7fffe4395592492c2f

                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                                          Filesize

                                                                          3KB

                                                                          MD5

                                                                          dc41a84342c56d5a3819b047ca39629d

                                                                          SHA1

                                                                          3aee6e92786f20e0b9ef0cfa50851f2b72890772

                                                                          SHA256

                                                                          bef6de6c30f7f75f85bdcf2da6641d4f158f357e7e89fb88fec1a0ca3f090211

                                                                          SHA512

                                                                          bca9f29f7408965ebdb8f53e6d3b5287afe2cefb83fed58ffd50a12620ce84b7078ba7804a36adb84e19efaed4a379c5aef5fcf50521001e6c15e2f0f018d32d

                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms

                                                                          Filesize

                                                                          3KB

                                                                          MD5

                                                                          e5a456c71a1a8ddef393e4cb92e78b20

                                                                          SHA1

                                                                          73d830bdcbad434c07fda2a432979d99ed8e0275

                                                                          SHA256

                                                                          c7b729436e8021185f8f49e92ddadbe55d886c3d51b5925945ba9d741f8483fc

                                                                          SHA512

                                                                          53767846ff22923c8f1c2ad94f629d874dbf3e6009a20563662ebe20d4c45125513f569ff59dfbbff1c80671efbc8f11f9d4565921c9a36bef1ca5dd77d4d922

                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

                                                                          Filesize

                                                                          2KB

                                                                          MD5

                                                                          7fc7523b045c91de0b3859d32b856c85

                                                                          SHA1

                                                                          d20c0686f6ae3a05066f7bcd6b9f60bed06ed272

                                                                          SHA256

                                                                          6f10bda2c0f788c6c4e6bec4bb34bc15a84de59cea2ee5e040d83a9494dbd2bf

                                                                          SHA512

                                                                          d032b7dbd8c0fdf6646bb3908be6877fdf06a5c18ea78d9a7804505c7a28337b432e98b37fea77dadf1d0892af5ffebc12287ac63f2027d28f76b71c21799e2a

                                                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          e7058e2b55315d814e38d965c12b1c5e

                                                                          SHA1

                                                                          27c16100779fbfc281d2cf73eaf05c95cf11ad61

                                                                          SHA256

                                                                          7cd03306af746a8ad9b2fda7b48e32a9deb6373b642ce8ed43feb0dd5bdac597

                                                                          SHA512

                                                                          7ed6386fc0640c1ac2a8b25987e839ec0e878a001e58eb004096bf8560f9d73d3ca1f6a48a695cfbbc81841b4bce01084476b77402eb12edfae14f801d1e2ce1

                                                                        • C:\Users\Admin\Desktop\Bolbi.txt

                                                                          Filesize

                                                                          29B

                                                                          MD5

                                                                          b37ed35ef479e43f406429bc36e68ec4

                                                                          SHA1

                                                                          5e3ec88d9d13d136af28dea0d3c2529f5b6e3b82

                                                                          SHA256

                                                                          cc2b26f9e750e05cd680ef5721d9269fe4c8d23cabf500a2ff9065b6b4f7e08c

                                                                          SHA512

                                                                          d1c1ea6292d8113ce8f02a9ad3921e2d8632f036bdfa243bd6600a173ac0b1fc659f91b43c8d9ec0beaabb87d9654f5f231e98fde27e4d9bdfd5862ca5cb13b7

                                                                        • C:\Users\Admin\Desktop\Bolbi.txt

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          e6c62b833d58fa17f0f93b0292f9b9de

                                                                          SHA1

                                                                          75d21962cb7285a9e9cd55ffa89aef6311286988

                                                                          SHA256

                                                                          8cb2c097b30221dd7ac35299f9f15aaddedf34267f8024784f86ead925e178ea

                                                                          SHA512

                                                                          59b0d2f254922395b348716778756f9e235fc388cb9d16e776c937bb3b0b83838f485bce8fdebfd2ffc376f30bea29070411eb1521b9f87a5f89ff13575274ca

                                                                        • C:\Users\Admin\Downloads\The-MALWARE-Repo-master\The-MALWARE-Repo-master\Trojan\~$ankenstein.doc

                                                                          Filesize

                                                                          1KB

                                                                          MD5

                                                                          acd4dd2eee8f45ec48553064687a6c27

                                                                          SHA1

                                                                          5e67a2b35e0762090e8f723a7e9dfcd912486cee

                                                                          SHA256

                                                                          93a6ce74fd45c512d9660f42bf75450d91640d40c687364eb6c8f184cc4fab8d

                                                                          SHA512

                                                                          51e5c07d5e25bfd6d5df512790b8360aeb9f94f4e8b27d8e594304d385f7cf18238439c04aea42522c1d5e427fc3af49cbcdf7ebbbefab625e828d96ca79ae56

                                                                        • memory/1100-1140-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                          Filesize

                                                                          36KB

                                                                        • memory/1100-1102-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                          Filesize

                                                                          36KB

                                                                        • memory/1100-1106-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                          Filesize

                                                                          36KB

                                                                        • memory/1100-1110-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                          Filesize

                                                                          36KB

                                                                        • memory/1100-1660-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                          Filesize

                                                                          36KB

                                                                        • memory/1100-1081-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                          Filesize

                                                                          36KB

                                                                        • memory/1100-1179-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                          Filesize

                                                                          36KB

                                                                        • memory/1100-1087-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                          Filesize

                                                                          36KB

                                                                        • memory/1100-1088-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                          Filesize

                                                                          36KB

                                                                        • memory/1100-1092-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                          Filesize

                                                                          36KB

                                                                        • memory/1100-1096-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                          Filesize

                                                                          36KB

                                                                        • memory/1136-1678-0x0000000000F40000-0x0000000000FB2000-memory.dmp

                                                                          Filesize

                                                                          456KB

                                                                        • memory/1136-1679-0x0000000005830000-0x00000000058CC000-memory.dmp

                                                                          Filesize

                                                                          624KB

                                                                        • memory/1136-1681-0x0000000005C10000-0x0000000005C1A000-memory.dmp

                                                                          Filesize

                                                                          40KB

                                                                        • memory/1136-1680-0x0000000005A70000-0x0000000005AC6000-memory.dmp

                                                                          Filesize

                                                                          344KB

                                                                        • memory/1212-1664-0x00000000054A0000-0x0000000005A46000-memory.dmp

                                                                          Filesize

                                                                          5.6MB

                                                                        • memory/1212-1663-0x0000000000740000-0x0000000000750000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/1212-1666-0x00000000050A0000-0x00000000050AA000-memory.dmp

                                                                          Filesize

                                                                          40KB

                                                                        • memory/1212-1665-0x0000000004FD0000-0x0000000005062000-memory.dmp

                                                                          Filesize

                                                                          584KB

                                                                        • memory/2320-1085-0x0000000000400000-0x0000000000409000-memory.dmp

                                                                          Filesize

                                                                          36KB

                                                                        • memory/3604-1124-0x00007FFF851B0000-0x00007FFF851C0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/3604-1128-0x00007FFF828B0000-0x00007FFF828C0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/3604-1123-0x00007FFF851B0000-0x00007FFF851C0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/3604-1126-0x00007FFF851B0000-0x00007FFF851C0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/3604-1125-0x00007FFF851B0000-0x00007FFF851C0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/3604-1122-0x00007FFF851B0000-0x00007FFF851C0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/3604-1127-0x00007FFF828B0000-0x00007FFF828C0000-memory.dmp

                                                                          Filesize

                                                                          64KB

                                                                        • memory/5376-1061-0x0000000000400000-0x00000000004A4000-memory.dmp

                                                                          Filesize

                                                                          656KB

                                                                        • memory/5376-1072-0x0000000000400000-0x00000000004A4000-memory.dmp

                                                                          Filesize

                                                                          656KB

                                                                        • memory/5392-1065-0x0000000000400000-0x0000000000422000-memory.dmp

                                                                          Filesize

                                                                          136KB

                                                                        • memory/5532-1062-0x0000000000400000-0x00000000004A4000-memory.dmp

                                                                          Filesize

                                                                          656KB

                                                                        • memory/5532-1075-0x0000000000400000-0x00000000004A4000-memory.dmp

                                                                          Filesize

                                                                          656KB

                                                                        • memory/5596-1074-0x0000000001000000-0x0000000001026000-memory.dmp

                                                                          Filesize

                                                                          152KB

                                                                        • memory/5596-1073-0x0000000001000000-0x0000000001026000-memory.dmp

                                                                          Filesize

                                                                          152KB