Analysis

  • max time kernel
    330s
  • max time network
    331s
  • platform
    windows10-ltsc 2021_x64
  • resource
    win10ltsc2021-20250207-es
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250207-eslocale:es-esos:windows10-ltsc 2021-x64systemwindows
  • submitted
    08-02-2025 10:35

General

Malware Config

Extracted

Path

C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\@[email protected]

Family

wannacry

Ransom Note
Q: What's wrong with my files? A: Ooops, your important files are encrypted. It means you will not be able to access them anymore until they are decrypted. If you follow our instructions, we guarantee that you can decrypt all your files quickly and safely! Let's start decrypting! Q: What do I do? A: First, you need to pay service fees for the decryption. Please send $300 worth of bitcoin to this bitcoin address: 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 Next, please find an application file named "@[email protected]". It is the decrypt software. Run and follow the instructions! (You may need to disable your antivirus for a while.) Q: How can I trust? A: Don't worry about decryption. We will decrypt your files surely because nobody will trust us if we cheat users. * If you need our assistance, send a message by clicking <Contact Us> on the decryptor window. �
Wallets

13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94

Signatures

  • Emotet

    Emotet is a trojan that is primarily spread through spam emails.

  • Emotet family
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 5 IoCs
  • Modifies Windows Defender notification settings 3 TTPs 5 IoCs
  • Wannacry

    WannaCry is a ransomware cryptoworm.

  • Wannacry family
  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Downloads MZ/PE file 1 IoCs
  • Stops running service(s) 4 TTPs
  • Drops startup file 2 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 38 IoCs
  • Loads dropped DLL 9 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Using powershell.exe command.

  • File and Directory Permissions Modification: Windows File and Directory Permissions Modification 1 TTPs
  • Installs/modifies Browser Helper Object 2 TTPs 8 IoCs

    BHOs are DLL modules which act as plugins for Internet Explorer.

  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 30 IoCs
  • Launches sc.exe 10 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Enumerates system info in registry 2 TTPs 6 IoCs
  • Modifies Internet Explorer settings 1 TTPs 24 IoCs
  • Modifies data under HKEY_USERS 3 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 49 IoCs
  • Suspicious use of SetWindowsHookEx 21 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/goddamnnoob/Malware-1/blob/master/MEMZ-Clean.bat
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ffca872cc40,0x7ffca872cc4c,0x7ffca872cc58
      2⤵
        PID:980
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1732,i,9796796942355364144,10315755193096537163,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=1736 /prefetch:2
        2⤵
          PID:5056
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1924,i,9796796942355364144,10315755193096537163,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=1832 /prefetch:3
          2⤵
            PID:1308
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,9796796942355364144,10315755193096537163,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=2416 /prefetch:8
            2⤵
              PID:1180
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3108,i,9796796942355364144,10315755193096537163,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=3144 /prefetch:1
              2⤵
                PID:4716
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3116,i,9796796942355364144,10315755193096537163,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=3172 /prefetch:1
                2⤵
                  PID:1276
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4668,i,9796796942355364144,10315755193096537163,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=4780 /prefetch:8
                  2⤵
                    PID:5112
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=5196,i,9796796942355364144,10315755193096537163,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=5204 /prefetch:8
                    2⤵
                      PID:3716
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAACEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=4644,i,9796796942355364144,10315755193096537163,262144 --variations-seed-version=20250206-180041.353000 --mojo-platform-channel-handle=1080 /prefetch:8
                      2⤵
                      • Drops file in Windows directory
                      • Suspicious behavior: EnumeratesProcesses
                      PID:6956
                  • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                    "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                    1⤵
                      PID:1776
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                      1⤵
                        PID:1028
                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-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
                        1⤵
                        • System Location Discovery: System Language Discovery
                        • System Network Configuration Discovery: Internet Connection Discovery
                        PID:4216
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:1744
                        • C:\Users\Admin\AppData\Local\Temp\716996bb-e3e2-42d9-b095-f059eb6f260f_Malware-1-master.zip.60f\Malware-1-master\5.exe
                          "C:\Users\Admin\AppData\Local\Temp\716996bb-e3e2-42d9-b095-f059eb6f260f_Malware-1-master.zip.60f\Malware-1-master\5.exe"
                          1⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious behavior: EnumeratesProcesses
                          PID:4896
                          • C:\Users\Admin\AppData\Local\Temp\716996bb-e3e2-42d9-b095-f059eb6f260f_Malware-1-master.zip.60f\Malware-1-master\5.exe
                            "C:\Users\Admin\AppData\Local\Temp\716996bb-e3e2-42d9-b095-f059eb6f260f_Malware-1-master.zip.60f\Malware-1-master\5.exe"
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4448
                        • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\butterflyondesktop.exe
                          "C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\butterflyondesktop.exe"
                          1⤵
                          • System Location Discovery: System Language Discovery
                          PID:4552
                          • C:\Users\Admin\AppData\Local\Temp\is-OE8JD.tmp\butterflyondesktop.tmp
                            "C:\Users\Admin\AppData\Local\Temp\is-OE8JD.tmp\butterflyondesktop.tmp" /SL5="$802E6,2719719,54272,C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\butterflyondesktop.exe"
                            2⤵
                            • Executes dropped EXE
                            • Adds Run key to start application
                            • Drops file in Program Files directory
                            • System Location Discovery: System Language Discovery
                            PID:2264
                            • C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe
                              "C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe"
                              3⤵
                              • Executes dropped EXE
                              • Suspicious use of SendNotifyMessage
                              PID:4760
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://freedesktopsoft.com/butterflyondesktoplike.html
                              3⤵
                              • Enumerates system info in registry
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                              • Suspicious use of SendNotifyMessage
                              PID:3056
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ffc920f46f8,0x7ffc920f4708,0x7ffc920f4718
                                4⤵
                                  PID:4948
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:2
                                  4⤵
                                    PID:1864
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:3
                                    4⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4672
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:8
                                    4⤵
                                      PID:3836
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
                                      4⤵
                                        PID:2612
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:1
                                        4⤵
                                          PID:3028
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:1
                                          4⤵
                                            PID:5476
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:1
                                            4⤵
                                              PID:5496
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:1
                                              4⤵
                                                PID:5772
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5692 /prefetch:1
                                                4⤵
                                                  PID:4756
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5864 /prefetch:1
                                                  4⤵
                                                    PID:4868
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=6260 /prefetch:8
                                                    4⤵
                                                      PID:5748
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --service-sandbox-type=none --mojo-platform-channel-handle=6260 /prefetch:8
                                                      4⤵
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:2508
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3108 /prefetch:1
                                                      4⤵
                                                        PID:6776
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3708 /prefetch:1
                                                        4⤵
                                                          PID:6788
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6812 /prefetch:1
                                                          4⤵
                                                            PID:6948
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6192 /prefetch:1
                                                            4⤵
                                                              PID:6964
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6168 /prefetch:1
                                                              4⤵
                                                                PID:6172
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1760 /prefetch:1
                                                                4⤵
                                                                  PID:1008
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:1
                                                                  4⤵
                                                                    PID:6128
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4076 /prefetch:2
                                                                    4⤵
                                                                      PID:1012
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=284 /prefetch:1
                                                                      4⤵
                                                                        PID:5736
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:1
                                                                        4⤵
                                                                          PID:5140
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6480 /prefetch:1
                                                                          4⤵
                                                                            PID:5836
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,12180689655516997432,5091874356601673201,131072 --lang=es --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6680 /prefetch:1
                                                                            4⤵
                                                                              PID:6436
                                                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BD5013E8-3042-4F58-9724-EFCA067CEF8A}\MicrosoftEdge_X64_132.0.2957.140.exe
                                                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BD5013E8-3042-4F58-9724-EFCA067CEF8A}\MicrosoftEdge_X64_132.0.2957.140.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
                                                                        1⤵
                                                                          PID:4392
                                                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BD5013E8-3042-4F58-9724-EFCA067CEF8A}\EDGEMITMP_D98D1.tmp\setup.exe
                                                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BD5013E8-3042-4F58-9724-EFCA067CEF8A}\EDGEMITMP_D98D1.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BD5013E8-3042-4F58-9724-EFCA067CEF8A}\MicrosoftEdge_X64_132.0.2957.140.exe" --msedge --verbose-logging --do-not-launch-msedge --system-level --channel=stable
                                                                            2⤵
                                                                            • Boot or Logon Autostart Execution: Active Setup
                                                                            • Executes dropped EXE
                                                                            • Installs/modifies Browser Helper Object
                                                                            • Drops file in Program Files directory
                                                                            • Drops file in Windows directory
                                                                            • Modifies Internet Explorer settings
                                                                            • Modifies registry class
                                                                            • System policy modification
                                                                            PID:564
                                                                            • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BD5013E8-3042-4F58-9724-EFCA067CEF8A}\EDGEMITMP_D98D1.tmp\setup.exe
                                                                              "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BD5013E8-3042-4F58-9724-EFCA067CEF8A}\EDGEMITMP_D98D1.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BD5013E8-3042-4F58-9724-EFCA067CEF8A}\EDGEMITMP_D98D1.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff6b409a818,0x7ff6b409a824,0x7ff6b409a830
                                                                              3⤵
                                                                              • Executes dropped EXE
                                                                              • Drops file in Windows directory
                                                                              PID:4188
                                                                            • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BD5013E8-3042-4F58-9724-EFCA067CEF8A}\EDGEMITMP_D98D1.tmp\setup.exe
                                                                              "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BD5013E8-3042-4F58-9724-EFCA067CEF8A}\EDGEMITMP_D98D1.tmp\setup.exe" --msedge --channel=stable --system-level --verbose-logging --create-shortcuts=2 --install-level=1
                                                                              3⤵
                                                                              • Executes dropped EXE
                                                                              • Drops file in System32 directory
                                                                              • Drops file in Program Files directory
                                                                              • Drops file in Windows directory
                                                                              • Modifies data under HKEY_USERS
                                                                              PID:5356
                                                                              • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BD5013E8-3042-4F58-9724-EFCA067CEF8A}\EDGEMITMP_D98D1.tmp\setup.exe
                                                                                "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BD5013E8-3042-4F58-9724-EFCA067CEF8A}\EDGEMITMP_D98D1.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BD5013E8-3042-4F58-9724-EFCA067CEF8A}\EDGEMITMP_D98D1.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff6b409a818,0x7ff6b409a824,0x7ff6b409a830
                                                                                4⤵
                                                                                • Executes dropped EXE
                                                                                • Drops file in Windows directory
                                                                                PID:5392
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --msedge --channel=stable --remove-deprecated-packages --verbose-logging --system-level
                                                                              3⤵
                                                                              • Executes dropped EXE
                                                                              • Drops file in Windows directory
                                                                              PID:5720
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff7b1b8a818,0x7ff7b1b8a824,0x7ff7b1b8a830
                                                                                4⤵
                                                                                • Executes dropped EXE
                                                                                • Drops file in Windows directory
                                                                                PID:5816
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --msedge --channel=stable --update-game-assist-package --verbose-logging --system-level
                                                                              3⤵
                                                                              • Executes dropped EXE
                                                                              • Drops file in Program Files directory
                                                                              • Drops file in Windows directory
                                                                              PID:5796
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=132.0.6834.160 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\132.0.2957.140\Installer\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=132.0.2957.140 --initial-client-data=0x248,0x24c,0x250,0x224,0x254,0x7ff7b1b8a818,0x7ff7b1b8a824,0x7ff7b1b8a830
                                                                                4⤵
                                                                                • Executes dropped EXE
                                                                                • Drops file in Windows directory
                                                                                PID:5840
                                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                          1⤵
                                                                            PID:1144
                                                                          • C:\Windows\System32\CompPkgSrv.exe
                                                                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                            1⤵
                                                                              PID:2264
                                                                            • C:\Windows\SysWOW64\dividernetsh.exe
                                                                              "C:\Windows\SysWOW64\dividernetsh.exe"
                                                                              1⤵
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              PID:5472
                                                                              • C:\Windows\SysWOW64\dividernetsh.exe
                                                                                "C:\Windows\SysWOW64\dividernetsh.exe"
                                                                                2⤵
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                PID:1604
                                                                                • C:\Windows\SysWOW64\dividernetsh.exe
                                                                                  "C:\Windows\SysWOW64\dividernetsh.exe"
                                                                                  3⤵
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:6716
                                                                            • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\WannaCry.EXE
                                                                              "C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\WannaCry.EXE"
                                                                              1⤵
                                                                              • Drops startup file
                                                                              • Sets desktop wallpaper using registry
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:5256
                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                attrib +h .
                                                                                2⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Views/modifies file attributes
                                                                                PID:1408
                                                                              • C:\Windows\SysWOW64\icacls.exe
                                                                                icacls . /grant Everyone:F /T /C /Q
                                                                                2⤵
                                                                                • Modifies file permissions
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:3960
                                                                              • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\taskdl.exe
                                                                                taskdl.exe
                                                                                2⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:2708
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                C:\Windows\system32\cmd.exe /c 103661739011069.bat
                                                                                2⤵
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:1408
                                                                                • C:\Windows\SysWOW64\cscript.exe
                                                                                  cscript.exe //nologo m.vbs
                                                                                  3⤵
                                                                                    PID:6084
                                                                                • C:\Windows\SysWOW64\attrib.exe
                                                                                  attrib +h +s F:\$RECYCLE
                                                                                  2⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Views/modifies file attributes
                                                                                  PID:2708
                                                                                • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\@[email protected]
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:6492
                                                                                  • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\TaskData\Tor\taskhsvc.exe
                                                                                    TaskData\Tor\taskhsvc.exe
                                                                                    3⤵
                                                                                    • Executes dropped EXE
                                                                                    • Loads dropped DLL
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    PID:6960
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  cmd.exe /c start /b @[email protected] vs
                                                                                  2⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:6496
                                                                                  • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\@[email protected]
                                                                                    3⤵
                                                                                    • Executes dropped EXE
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:6508
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      cmd.exe /c vssadmin delete shadows /all /quiet & wmic shadowcopy delete & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet
                                                                                      4⤵
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:5792
                                                                                      • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                        wmic shadowcopy delete
                                                                                        5⤵
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        PID:5732
                                                                                • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\taskdl.exe
                                                                                  taskdl.exe
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:6472
                                                                                • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\taskse.exe
                                                                                  taskse.exe C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\@[email protected]
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:6512
                                                                                • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\@[email protected]
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • Sets desktop wallpaper using registry
                                                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:6548
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  cmd.exe /c reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "tzqlwyndqnw150" /t REG_SZ /d "\"C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\tasksche.exe\"" /f
                                                                                  2⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:7124
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "tzqlwyndqnw150" /t REG_SZ /d "\"C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\tasksche.exe\"" /f
                                                                                    3⤵
                                                                                    • Adds Run key to start application
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Modifies registry key
                                                                                    PID:6636
                                                                                • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\taskdl.exe
                                                                                  taskdl.exe
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:544
                                                                                • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\taskse.exe
                                                                                  taskse.exe C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\@[email protected]
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:5408
                                                                                • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\@[email protected]
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:2812
                                                                                • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\taskdl.exe
                                                                                  taskdl.exe
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  PID:1776
                                                                                • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\taskse.exe
                                                                                  taskse.exe C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\@[email protected]
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:568
                                                                                • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\@[email protected]
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:2632
                                                                                • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\taskse.exe
                                                                                  taskse.exe C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\@[email protected]
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:3340
                                                                                • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\@[email protected]
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:6828
                                                                                • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\taskdl.exe
                                                                                  taskdl.exe
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:5832
                                                                                • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\taskse.exe
                                                                                  taskse.exe C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\@[email protected]
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:3564
                                                                                • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\taskdl.exe
                                                                                  taskdl.exe
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:5760
                                                                                • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\taskse.exe
                                                                                  taskse.exe C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\@[email protected]
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2176
                                                                                • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\@[email protected]
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • Sets desktop wallpaper using registry
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:7116
                                                                                • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\taskdl.exe
                                                                                  taskdl.exe
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:6864
                                                                                • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\taskse.exe
                                                                                  taskse.exe C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\@[email protected]
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:6156
                                                                                • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\@[email protected]
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:6668
                                                                                • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\taskdl.exe
                                                                                  taskdl.exe
                                                                                  2⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:7044
                                                                              • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\youwin.exe
                                                                                "C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\youwin.exe"
                                                                                1⤵
                                                                                • Modifies Windows Defender DisableAntiSpyware settings
                                                                                • Modifies Windows Defender notification settings
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                PID:6432
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  /c sc stop WinDefend
                                                                                  2⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:7136
                                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                                    sc stop WinDefend
                                                                                    3⤵
                                                                                    • Launches sc.exe
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:6440
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  /c sc delete WinDefend
                                                                                  2⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:3568
                                                                                  • C:\Windows\SysWOW64\sc.exe
                                                                                    sc delete WinDefend
                                                                                    3⤵
                                                                                    • Launches sc.exe
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:5052
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
                                                                                  2⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:6388
                                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                    powershell Set-MpPreference -DisableRealtimeMonitoring $true
                                                                                    3⤵
                                                                                    • Command and Scripting Interpreter: PowerShell
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    PID:6408
                                                                                • C:\Users\Admin\AppData\Roaming\NetSf\youwin.exe
                                                                                  C:\Users\Admin\AppData\Roaming\NetSf\youwin.exe
                                                                                  2⤵
                                                                                  • Modifies Windows Defender DisableAntiSpyware settings
                                                                                  • Modifies Windows Defender notification settings
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:4676
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    /c sc stop WinDefend
                                                                                    3⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:6700
                                                                                    • C:\Windows\SysWOW64\sc.exe
                                                                                      sc stop WinDefend
                                                                                      4⤵
                                                                                      • Launches sc.exe
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:5808
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    /c sc delete WinDefend
                                                                                    3⤵
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    PID:6696
                                                                                    • C:\Windows\SysWOW64\sc.exe
                                                                                      sc delete WinDefend
                                                                                      4⤵
                                                                                      • Launches sc.exe
                                                                                      PID:5848
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
                                                                                    3⤵
                                                                                      PID:6712
                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                        powershell Set-MpPreference -DisableRealtimeMonitoring $true
                                                                                        4⤵
                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        PID:1604
                                                                                    • C:\Windows\system32\svchost.exe
                                                                                      C:\Windows\system32\svchost.exe
                                                                                      3⤵
                                                                                      • Adds Run key to start application
                                                                                      PID:6740
                                                                                      • C:\Windows\SYSTEM32\regini.exe
                                                                                        regini C:\Users\Admin\AppData\Local\Temp\tmp051
                                                                                        4⤵
                                                                                          PID:7020
                                                                                        • C:\Windows\SYSTEM32\regini.exe
                                                                                          regini C:\Users\Admin\AppData\Local\Temp\tmp051
                                                                                          4⤵
                                                                                            PID:6536
                                                                                    • C:\Windows\system32\vssvc.exe
                                                                                      C:\Windows\system32\vssvc.exe
                                                                                      1⤵
                                                                                        PID:2024
                                                                                      • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\youwin.exe
                                                                                        "C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\youwin.exe"
                                                                                        1⤵
                                                                                        • Modifies Windows Defender DisableAntiSpyware settings
                                                                                        • Modifies Windows Defender notification settings
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        PID:3812
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          /c sc stop WinDefend
                                                                                          2⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:6184
                                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                                            sc stop WinDefend
                                                                                            3⤵
                                                                                            • Launches sc.exe
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:2524
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          /c sc delete WinDefend
                                                                                          2⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:2804
                                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                                            sc delete WinDefend
                                                                                            3⤵
                                                                                            • Launches sc.exe
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:4640
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
                                                                                          2⤵
                                                                                            PID:1560
                                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                              powershell Set-MpPreference -DisableRealtimeMonitoring $true
                                                                                              3⤵
                                                                                              • Command and Scripting Interpreter: PowerShell
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              PID:1872
                                                                                          • C:\Users\Default\AppData\Roaming\youwin.exe
                                                                                            C:\Users\Default\AppData\Roaming\youwin.exe
                                                                                            2⤵
                                                                                            • Modifies Windows Defender DisableAntiSpyware settings
                                                                                            • Modifies Windows Defender notification settings
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            PID:5524
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              /c sc stop WinDefend
                                                                                              3⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:1460
                                                                                              • C:\Windows\SysWOW64\sc.exe
                                                                                                sc stop WinDefend
                                                                                                4⤵
                                                                                                • Launches sc.exe
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:6744
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              /c sc delete WinDefend
                                                                                              3⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:2880
                                                                                              • C:\Windows\SysWOW64\sc.exe
                                                                                                sc delete WinDefend
                                                                                                4⤵
                                                                                                • Launches sc.exe
                                                                                                PID:348
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
                                                                                              3⤵
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:5376
                                                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                powershell Set-MpPreference -DisableRealtimeMonitoring $true
                                                                                                4⤵
                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:6700
                                                                                            • C:\Users\Admin\AppData\Roaming\NetSf\youwin.exe
                                                                                              C:\Users\Admin\AppData\Roaming\NetSf\youwin.exe
                                                                                              3⤵
                                                                                              • Modifies Windows Defender DisableAntiSpyware settings
                                                                                              • Modifies Windows Defender notification settings
                                                                                              • Executes dropped EXE
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              PID:3100
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                /c sc stop WinDefend
                                                                                                4⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:4012
                                                                                                • C:\Windows\SysWOW64\sc.exe
                                                                                                  sc stop WinDefend
                                                                                                  5⤵
                                                                                                  • Launches sc.exe
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:6892
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                /c sc delete WinDefend
                                                                                                4⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:6416
                                                                                                • C:\Windows\SysWOW64\sc.exe
                                                                                                  sc delete WinDefend
                                                                                                  5⤵
                                                                                                  • Launches sc.exe
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:6572
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                /c powershell Set-MpPreference -DisableRealtimeMonitoring $true
                                                                                                4⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:7072
                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  powershell Set-MpPreference -DisableRealtimeMonitoring $true
                                                                                                  5⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:2648
                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                C:\Windows\system32\svchost.exe
                                                                                                4⤵
                                                                                                  PID:7060
                                                                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuNDMiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuNDMiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7MUZENjM1NTUtRUUyNC00RTNFLTk1MEYtQTlGNzdGNDAyREI0fSIgdXNlcmlkPSJ7QzJCNjhFOTYtNkE2My00Q0VFLThEMUItODJGQTNDQjkyNjRFfSIgaW5zdGFsbHNvdXJjZT0ic2NoZWR1bGVyIiByZXF1ZXN0aWQ9Ins2MTY2Mzk0NS01NDcwLTQ3NjktOEI5Ri1BRTcyREUzNzc4REN9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iMiIgcGh5c21lbW9yeT0iNCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQ0LjQ1MjkiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSIxMjUiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O1ZQUW9QMUYrZnExNXdSemgxa1BMNFBNcFdoOE9STUI1aXp2ck9DL2NoalE9JnF1b3Q7Ii8-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-PGV2ZW50IGV2ZW50dHlwZT0iMTMiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjQ5MjkzODM3NTAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiLz48ZXZlbnQgZXZlbnR0eXBlPSIxNCIgZXZlbnRyZXN1bHQ9IjAiIGVycm9yY29kZT0iLTIxNDcwMjM4MzgiIGV4dHJhY29kZTE9IjAiIHN5c3RlbV91cHRpbWVfdGlja3M9IjU2MTM2NTkyMjAiIHNvdXJjZV91cmxfaW5kZXg9IjAiIGRvbmVfYmVmb3JlX29vYmVfY29tcGxldGU9IjAiIGRvd25sb2FkZXI9ImRvIiB1cmw9Imh0dHA6Ly9tc2VkZ2UuYi50bHUuZGwuZGVsaXZlcnkubXAubWljcm9zb2Z0LmNvbS9maWxlc3RyZWFtaW5nc2VydmljZS9maWxlcy8wNzQwMDM2YS00ZTE4LTQ1NmQtOTZmYS1kMWQ5YzRjYTQ2NzY_UDE9MTczOTYxNTc2MCZhbXA7UDI9NDA0JmFtcDtQMz0yJmFtcDtQND1NM1VtbUZOQ1BKZTB2cVdJR001VEdLUUYlMmY4bzd4WkRXVk43dm5iRDRNWTVydFI3cE9hQWFVZ2RtOUtKTWdKdGh1Y0FEdzI0ell2JTJmd3Q0VFElMmYwbnNpQSUzZCUzZCIgc2VydmVyX2lwX2hpbnQ9IiIgY2RuX2NpZD0iLTEiIGNkbl9jY2M9IiIgY2RuX21zZWRnZV9yZWY9IiIgY2RuX2F6dXJlX3JlZl9vcmlnaW5fc2hpZWxkPSIiIGNkbl9jYWNoZT0iIiBjZG5fcDNwPSIiIGRvd25sb2FkZWQ9IjAiIHRvdGFsPSIwIiBkb3dubG9hZF90aW1lX21zPSIwIi8-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-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-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-
                                                                                            1⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                            PID:6160
                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\MEMZ-Clean.exe
                                                                                            "C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\MEMZ-Clean.exe"
                                                                                            1⤵
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:5304
                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=half+life+3+release+date
                                                                                              2⤵
                                                                                                PID:4324
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x150,0x154,0x158,0x12c,0x15c,0x7ffc920f46f8,0x7ffc920f4708,0x7ffc920f4718
                                                                                                  3⤵
                                                                                                    PID:4052
                                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://google.co.ck/search?q=batch+virus+download
                                                                                                  2⤵
                                                                                                    PID:6052
                                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x150,0x154,0x158,0x12c,0x15c,0x7ffc920f46f8,0x7ffc920f4708,0x7ffc920f4718
                                                                                                      3⤵
                                                                                                        PID:6912
                                                                                                    • C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe
                                                                                                      "C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"
                                                                                                      2⤵
                                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                                      PID:2920
                                                                                                      • C:\Windows\splwow64.exe
                                                                                                        C:\Windows\splwow64.exe 12288
                                                                                                        3⤵
                                                                                                          PID:2612
                                                                                                    • C:\Windows\system32\AUDIODG.EXE
                                                                                                      C:\Windows\system32\AUDIODG.EXE 0x4fc 0x244
                                                                                                      1⤵
                                                                                                        PID:4552
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
                                                                                                        1⤵
                                                                                                          PID:4740
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          "C:\Windows\system32\cmd.exe"
                                                                                                          1⤵
                                                                                                            PID:5724

                                                                                                          Network

                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                          Replay Monitor

                                                                                                          Loading Replay Monitor...

                                                                                                          Downloads

                                                                                                          • C:\Program Files (x86)\Butterfly on Desktop\ButterflyOnDesktop.exe

                                                                                                            Filesize

                                                                                                            3.0MB

                                                                                                            MD5

                                                                                                            81aab57e0ef37ddff02d0106ced6b91e

                                                                                                            SHA1

                                                                                                            6e3895b350ef1545902bd23e7162dfce4c64e029

                                                                                                            SHA256

                                                                                                            a70f9e100dddb177f68ee7339b327a20cd9289fae09dcdce3dbcbc3e86756287

                                                                                                            SHA512

                                                                                                            a651d0a526d31036a302f7ef1ee2273bb7c29b5206c9b17339baa149dd13958ca63db827d09b4e12202e44d79aac2e864522aca1228118ba3dcd259fe1fcf717

                                                                                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{BD5013E8-3042-4F58-9724-EFCA067CEF8A}\EDGEMITMP_D98D1.tmp\setup.exe

                                                                                                            Filesize

                                                                                                            6.6MB

                                                                                                            MD5

                                                                                                            b4c8ad75087b8634d4f04dc6f92da9aa

                                                                                                            SHA1

                                                                                                            7efaa2472521c79d58c4ef18a258cc573704fb5d

                                                                                                            SHA256

                                                                                                            522a25568bb503cf8b44807661f31f0921dee91d37691bf399868733205690bf

                                                                                                            SHA512

                                                                                                            5094505b33a848badcffd6b3b93aad9ad73f391e201dee052376c4f8573ba351f0b8c102131216088ffb38d0ed7b5fe70ba95c3ac2c33a50c993584fe7c435e3

                                                                                                          • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Edge.lnk

                                                                                                            Filesize

                                                                                                            2KB

                                                                                                            MD5

                                                                                                            7f3cbb6ae24dfb7e6cab1dd556c9329b

                                                                                                            SHA1

                                                                                                            15536ae3185b36bc800c9d1da64332e6f4218dc1

                                                                                                            SHA256

                                                                                                            010e9beba6ca82886486d5f49bc3fc02689572100e1c98c4878b825b42531a2c

                                                                                                            SHA512

                                                                                                            9808236e73ee541c0c28c0c835620c18274285d1d7f0bcb48a0b47f38405f52b1b8426e69352b5655eea89247791abc8433ce4690481a7c92e9f2128d4c1cd4b

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                            Filesize

                                                                                                            2KB

                                                                                                            MD5

                                                                                                            755b69f1dc9f10999e057f5fa2422959

                                                                                                            SHA1

                                                                                                            8c55f4a96122b376bdecac230dcad950bbd478ae

                                                                                                            SHA256

                                                                                                            4549e9b45dc892a7248dfa3c292e29e4840cb870b13ff2e5da5b56e7cf0daab6

                                                                                                            SHA512

                                                                                                            d37e6325c044eeb31985604c503684fe57179c4908a504964a7c61916426b063754aa4c81ad12edd09a4a67f5fe4fcaf4212eef07a3faae01e25903989eb090f

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                                                                                            Filesize

                                                                                                            3KB

                                                                                                            MD5

                                                                                                            dda98b8baf50d3b81647e1e1dc427388

                                                                                                            SHA1

                                                                                                            89b663ca854189ad81ec75f22d0a3cc880ffb0ca

                                                                                                            SHA256

                                                                                                            189d38f5227e18b09b5f59ce475e3b8125c0867a096642dfb51d3e40ca034a7b

                                                                                                            SHA512

                                                                                                            7f24aa55938b5918e89ff76f76605ec93f81721bb3a3bc90d5fa782b03c70bf7a839580e923a3753f2c38e76c5ceaee00d231309e82fe189de1d8cb0585a0054

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                            Filesize

                                                                                                            2B

                                                                                                            MD5

                                                                                                            d751713988987e9331980363e24189ce

                                                                                                            SHA1

                                                                                                            97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                            SHA256

                                                                                                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                            SHA512

                                                                                                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                            Filesize

                                                                                                            1KB

                                                                                                            MD5

                                                                                                            1d02931a6d33567e2d123be756e8afc5

                                                                                                            SHA1

                                                                                                            d6833f0e33ab362334b1bb16389e9c4adb6b5848

                                                                                                            SHA256

                                                                                                            33ca565cb1abb6c13fe6360398b60d80d50919fce48970664ba6f5d122afcd1c

                                                                                                            SHA512

                                                                                                            8507df9b226c6ddc8139191f0c8b02652e77384889ced503409c64fabeb6a64b1e27f74fdc1d84f2c4e3ab7718950ec5f524ab3ce4ff22a1968c5fe8c8497d16

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                            Filesize

                                                                                                            1KB

                                                                                                            MD5

                                                                                                            f086ee7be6a7a1db4c58432131036880

                                                                                                            SHA1

                                                                                                            48642bfb5985770e53dbc00237dc1158146fdcfd

                                                                                                            SHA256

                                                                                                            179a351f801269b41c886769febd7719cf653708f9e307f0b88547933656761d

                                                                                                            SHA512

                                                                                                            5365090a4dd6ad26c578e9066f6f51c860b8b07440fd308d7621db684a2b0d19c82827fe7e636989adc4c1928eb14da607d204c57ba9ec1a3fe7d29e0efec821

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                            Filesize

                                                                                                            1KB

                                                                                                            MD5

                                                                                                            8b3fb50ed14bffaf49b3f25bd5366604

                                                                                                            SHA1

                                                                                                            6365437a52356a38ad1497334d5822d1a3a8fa3d

                                                                                                            SHA256

                                                                                                            d00b61f3630c03cdb5bb6687f58a4ed28f1ab05cbca286d9d419c49786f4fdd1

                                                                                                            SHA512

                                                                                                            2bcbef1ba84d6b41dfcb44abcf40ff21634132ad5003c3ec9b33d960a1d506e5bae8d4482fd07016ffe8e65e91d3a5d10e1b7d0fdfb4eb3c298ee474da9485f4

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                                                                                            Filesize

                                                                                                            1KB

                                                                                                            MD5

                                                                                                            cc9a1df46da054508360b155c9386fcd

                                                                                                            SHA1

                                                                                                            b456b8a7697a134a1f36ab4bc1755f1bcefaf2db

                                                                                                            SHA256

                                                                                                            efb08b818a71c28b318e679003cf9e9a6cae4783a98f3b600da5f8cf2c464b17

                                                                                                            SHA512

                                                                                                            73b636c556cf0655d572f66f31036d77761f02d3426f78e21da92520e0825717c59728b6f659803eb901a54940fa66ef5899e86be2a577a4accc0ae00ca16a2c

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            f8602f1195ffbd10b1d3db93513555eb

                                                                                                            SHA1

                                                                                                            1687004ad869c77314fdfc722a1284d3f7c21c63

                                                                                                            SHA256

                                                                                                            fbc6c89be8551abf5ac4037359d9d9887972a6ab4b9b7bd5cc723d28b0760438

                                                                                                            SHA512

                                                                                                            419bbbb8ce0652cd33f825922cc4c5b74ff69fe224091c7442e6e47d847ad74153700087588f7223e4c71384cd2fd127e9d2d972161e175aee01f3113105309a

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            324ab9c12f33eece268b82588314e8ee

                                                                                                            SHA1

                                                                                                            d58d6e683b410ea6cba9266cf2b1bab2cc2d3906

                                                                                                            SHA256

                                                                                                            855b09dcbe8864a64a6953d114d0c1aa647623d4b91d107bd5ffe3fb6d07b33d

                                                                                                            SHA512

                                                                                                            d8d2cb51057589bb6f0e90529a00d2a432d11b35d0ad5cdcaeb7292a27e7a3c030dc64da79546e77d64a8aea3d79e28bc7847a5849b14605f444d3d9f31b277c

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            f159710e44a416f45ce240667bd53d34

                                                                                                            SHA1

                                                                                                            00b4cbc96b926f998567ed9cf198731e392b26c6

                                                                                                            SHA256

                                                                                                            c3c8e6ae9abac660c0fa615fede217731c27d83da3dfa0bc4f7dc3681b04a3c6

                                                                                                            SHA512

                                                                                                            ad02002f4f0b16727dac2dd85d01fccd186036bd75d25f350d3586fc693c924196793e89738df317c422d8456c05d652561fee924b9bcd300e2af2ebb7199ffc

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            7dc8bbf9bae8783cafd0d106e59bfd0d

                                                                                                            SHA1

                                                                                                            6cc5c552887dedb8ff6a544f83c0afb883bc3bb7

                                                                                                            SHA256

                                                                                                            e7696e932fb44b1e8ea5d8b3235daa6b1058a30d8ad5ed785559cb7a8e07d5fd

                                                                                                            SHA512

                                                                                                            808310e613217f003be1a4df8a9cd07dacd5eaf55a5f57184522f46432661d6ee0190ade371b442211e4733a5c56fc477e11b20cdedd3524adfbc6a3edfeedb6

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            0c82e9a9fcb8ab4ee466865a22bfc4b1

                                                                                                            SHA1

                                                                                                            95380d3b41e5211da909e05e95854daef0fc42b8

                                                                                                            SHA256

                                                                                                            a0f85f5eb087cf9d97f78d35972cfdc6c887be7900c866947030471da6073b19

                                                                                                            SHA512

                                                                                                            2f198b3e7b44ca24ffbf6f90825145706840ddd97f0a570513bdb56f3145c8e1619f97f0289a2a1b7858ab090e2827df57fa356d71d7689b5fa276613d7e273b

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            8KB

                                                                                                            MD5

                                                                                                            37a75b2b71a78026ab2f8065fb5173da

                                                                                                            SHA1

                                                                                                            af11a773c173a0102204752816869f7c1affc696

                                                                                                            SHA256

                                                                                                            ab2d0ece3146b699c4a3269c17f927dc6527fb3a105c71b4f1671595281bb713

                                                                                                            SHA512

                                                                                                            de22895a467cb26585118b1065c6244ca59f44c45b397a0efd04f19f4602bb763e13fdbd1a96fdb32b79f21a5a1e7adb751cec92f834d19b334a30c1ae77b31c

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            cd0a1872f62aaad7218b0c4d7586c70a

                                                                                                            SHA1

                                                                                                            a5a894832add6727d501b2319431db7341267e8b

                                                                                                            SHA256

                                                                                                            3e6c69511222c2f2a91599b4c671bf9f21278a4cff228d872b525125d3d70340

                                                                                                            SHA512

                                                                                                            af407f2c9b86bcab57cd6a45f9f90a8d1c746691708fa0a0f24b0b4ba04e2465bbdf8e3e50af6c3f2c56479ee41dae69e5874387cfaac420a3532f14b79a05ef

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            90def73145b2c9d5b181875e5219b7af

                                                                                                            SHA1

                                                                                                            6c3e582e3aa0d37b16e07881665ebfa13ffbcd92

                                                                                                            SHA256

                                                                                                            bceeab85a25096818c3c05081e65a3a399105e2d297a1d55ba95b571e719eb63

                                                                                                            SHA512

                                                                                                            55657758c857b82b5ebe7834e3d6034448cc11f135f6574ff707ddeb28ca2b26ad558d091fc0e5ccf686bdaa4aac107f8043a343758327d9af9d13efa1b8e4e3

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            8KB

                                                                                                            MD5

                                                                                                            b923cf02a16c9724e7c857b83eb27fd3

                                                                                                            SHA1

                                                                                                            bee9a4c45b447edcf2b928cde607f3122323522a

                                                                                                            SHA256

                                                                                                            7dd73d1e773128f72adb2ae0be4da963e4b51814147edc495508cfb6364ba64e

                                                                                                            SHA512

                                                                                                            65fc122fa03cf1cdb2a02cef788aa5c55c96619055b108bb71f8e81724ffdb6d29f5678aa2c27293ea5b00c8096408ebdf4b59533a7b2166a445432bcc61fb03

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            8KB

                                                                                                            MD5

                                                                                                            cf0c0c749749f1cffe2b213dbd55b066

                                                                                                            SHA1

                                                                                                            2d6b1739420d6612bda818ee4db51fc5e64fcc71

                                                                                                            SHA256

                                                                                                            8de5a775f6adb3d48513dd751c4f9c6f516ebe9abf6c95a60631e1486eb119c2

                                                                                                            SHA512

                                                                                                            d1f0e4e2b8ca16c695860d42e285612ad0dac4753b0e5dc9a68201ee933e0f8c604414cccae6bb025acf9642474bf1473030b27f2ca10888718c5b12d4bcb0e5

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            4ba09639b128425ecfc67881a5d01b06

                                                                                                            SHA1

                                                                                                            646530c6fd3de0a88a42699de3fc6bbca7b3eb98

                                                                                                            SHA256

                                                                                                            848963be3f678dc640b542f13fce477e67f102057cb1ccc0ed0173a200e81bfc

                                                                                                            SHA512

                                                                                                            edf47fa5636dd7e5c93def2a1f6f0ae59dcb18eb1cc15d8b44696d28f03e6acbfc111536a039c68431692cfdae461b67886a2e3140d299dad618e233dbe0c82c

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            1407b8c55240b6228daedd84e983a0a9

                                                                                                            SHA1

                                                                                                            02cfc84a3065380afba10fde4bed55fac4e9e371

                                                                                                            SHA256

                                                                                                            17addc7a1ac601bf7b6ac918be66a95619f5f70f5c5e8e32b42321f6225987f2

                                                                                                            SHA512

                                                                                                            4add2bc94eb5e273c4585799cc0f7c80b102aa289d8c65c127f48d51b94db070e68d10e4c6863c78a38286a51fcb31462538ccd6a78c419f61787233e306a3fe

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            af01a2716378275d690731a018102115

                                                                                                            SHA1

                                                                                                            b5ee298813b00b9ccd3aed7a4cd1d79843bc8c33

                                                                                                            SHA256

                                                                                                            df39998908eb1962942eb02d5d6e7bd0e98c510f5a5c47f092c19a840fc5da72

                                                                                                            SHA512

                                                                                                            b638b3ac42c183dc2f9f12f404a063d62072c64e1031dbb59d59b3a37c797dc9a62e9294e9a1166d500f72c930b583efc2610cd7ae4e95e70080642c8833d816

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            089859d3a1fc5e3f79dd9df0f88c6ab7

                                                                                                            SHA1

                                                                                                            dccb7ec70eb45b149eb5a433362cbb3db2106e03

                                                                                                            SHA256

                                                                                                            fbbfc546207a6393e7b063ef9d30a77cb17fbafa736469036ca04cd9e8ad9686

                                                                                                            SHA512

                                                                                                            5faece22937870cc806a8c415a734aa7e9bc92cb37a06a481edff9093d6c7a1830b8d55e9c0f7df017a0c86b6249dbb5e37b8a6f189aeb243564d0b933b872d8

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            60a7df95b891cf7122459c1056e9feb0

                                                                                                            SHA1

                                                                                                            d930477f5be24c4e44bb5eaedd015b80441059e9

                                                                                                            SHA256

                                                                                                            393db444c6679b5b73322ddd16dccb2857f2464b1343f862f4ec57447a3d7c1d

                                                                                                            SHA512

                                                                                                            a50c18c1ca678fe0e8cacc3969c8643bbbd79443b19ff3ea1b0a9386f46d0459e2ba4f45f330cf992588f9ad72a607bfc075da0b818c9cf94d97ba227cf41c33

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            8KB

                                                                                                            MD5

                                                                                                            87626b5adb7bf77530ae07c6a0eebfb7

                                                                                                            SHA1

                                                                                                            88e9e5df756538d8be8d29c4d90d1a8ea2467491

                                                                                                            SHA256

                                                                                                            992c8d77860964a6f67e9983f5eec1138eb769f5d3507fd6d94f7c3d4f308f08

                                                                                                            SHA512

                                                                                                            23c245aa3ce73b1c449293f9f8294bf2cd27d2f35d9cc2c03b24c36cec7b6ea8ce8edad617a6858d3bff14dcb34f8d6f79193bb6c178ca9aece47249b3c68af5

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            494f7ce620b7ee8f99b26cc4d7f7e64e

                                                                                                            SHA1

                                                                                                            858e38c05271cfa64574b1814fa348e0681ccee4

                                                                                                            SHA256

                                                                                                            52f5c66ca25dab8ab3c239c2fb862ddebf7c469481bdd657f18bd4314ca7d8dc

                                                                                                            SHA512

                                                                                                            6b43874d135d6bb228319072310a7f6c56217902643b0c4c43c3827617daf71d68cc353cfaafa82c164ebcab35f77b6f75eed655506154a152477c70c6db509b

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            c4f49df73a443cc52f0d6139bf528c96

                                                                                                            SHA1

                                                                                                            409f619e908b7ff6250713eec778a39895261344

                                                                                                            SHA256

                                                                                                            084cd29c6801ae565ced4a9aa51f7db400ef214621d424f2522df9a6bf48f1d1

                                                                                                            SHA512

                                                                                                            762165082e3732981a22133117042dc23394d3dbd731dc01e668082dc678c6e4b7ed9ff96f2ded582b9e17b9219e1cd02424f654a2efbc43287d9c7e3121fbbb

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            8bd21f62b607eca0a2b590145b1d293a

                                                                                                            SHA1

                                                                                                            476cf6af4fd84142db1b9d3709a5af93ad78cb83

                                                                                                            SHA256

                                                                                                            80599339f391e05e75ae70176ec59ca412147571574746aee9aa6e3dfa0789b8

                                                                                                            SHA512

                                                                                                            85b3ecf7e17f47be2f4ec5fd519018b47f9ada8433338e13ef96d738fce11dfa4d964959a665d5f2ef3c3010dadf77d7cd05c45bf6120bcb199b17994d069318

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            45e7f69ee8814540858860175775efcc

                                                                                                            SHA1

                                                                                                            f5dfd3097fe4f5921b393c4544d0aa35f329634b

                                                                                                            SHA256

                                                                                                            4a603ff3c03a4d04d775230886db514b87644b4593ce3219e06231e5436596fa

                                                                                                            SHA512

                                                                                                            d4dd3eefc338dfcead54fb6673216d85d2d6c52ed972555686b41cfeaadae8ec8234dc61b9dfb68cbe19d1b776609bb3af3131f0b544f59901edf201a67372ab

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            f1ac4ed8fad38c3d8c28f3ad8355c6fd

                                                                                                            SHA1

                                                                                                            cb6fa24fbbe33a8904dc571ad5da4a41fd37622f

                                                                                                            SHA256

                                                                                                            4d21de1ef422ee7a5a9193fa2ff8ba16d7509569d05e9e888857ad5bd30d314e

                                                                                                            SHA512

                                                                                                            c47de9b3a7b9d85b24ed5400dfc1095527b64db4fc47278a7aba248f4782f1913f4018364670900c6c2689b4c40635868a8cd4c7e7be5523e2246b6e1517954d

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            9KB

                                                                                                            MD5

                                                                                                            3029c8566bbb2b98b9293f2e09e2cfec

                                                                                                            SHA1

                                                                                                            89248f4949611b658a4f3261b0e84658c1cd33eb

                                                                                                            SHA256

                                                                                                            f4a3d85fdfd505896ede12c6a8914c6e5652c30397152c89afb35029d71f32d9

                                                                                                            SHA512

                                                                                                            c528506cb4992e4d12139ad45d5bcd96d94acd82f4e0b252158d20f6de498ad4c9f955da97837f55b3d181f6242b05fcc18a7bef80d5ca1a874981dfd513bbe8

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                            Filesize

                                                                                                            123KB

                                                                                                            MD5

                                                                                                            21699246824bf6f375c320a3737c9736

                                                                                                            SHA1

                                                                                                            28309df57ce22118bc46805a2d1d2b45f79aed6a

                                                                                                            SHA256

                                                                                                            0b724b840f5cf37dcfc868c2eea1dcd4bbc3231c89ed3219b25c11042b8b1d04

                                                                                                            SHA512

                                                                                                            c72cb71bbf196ff2d194803413cbcee0686656ecd746e8aefa5bc8d6493629535150818dc056be213010375ea4481dd5cf278efdc40f6ac920d6de40eb458d1f

                                                                                                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                                                                                            Filesize

                                                                                                            123KB

                                                                                                            MD5

                                                                                                            31977d0486595b162e7b19ad0cace4a4

                                                                                                            SHA1

                                                                                                            ea63c802c961531bdc75ef1853ab2fe38fe4d020

                                                                                                            SHA256

                                                                                                            3359bbe1f02c246b968b51e7128a2aaeabc84927e21a440ec29eee394280b28b

                                                                                                            SHA512

                                                                                                            9da19c99bee37a31f00d88f7d996255c98ffa0e4cd452bbc547fcd8fecff9449fb4e8724864495d21fe936587965dc22b0b547a1a21dd1b498b422de3b61f9a6

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                            Filesize

                                                                                                            152B

                                                                                                            MD5

                                                                                                            1a5e8201f031ff9882d47fd461908108

                                                                                                            SHA1

                                                                                                            60e05c7472ee49b6f13b5c2bcc56bd28bdab68d2

                                                                                                            SHA256

                                                                                                            79d2416dde70a38ee9fdb920e7ee16de89902dbe83a7b6561f644b1707c2ce38

                                                                                                            SHA512

                                                                                                            cea63b90757d46b82c025572b21183b555065366ade395e1efa6370a74d4878b6d1fc445992e83fc910dd7b087edc5ba77c9cc1aa4e78186b6c509a9c9f718e1

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                            Filesize

                                                                                                            792B

                                                                                                            MD5

                                                                                                            6d2958202d68a5f52b24584542683abe

                                                                                                            SHA1

                                                                                                            40723dffe7e2cf2b705bc723002cda1d9b241180

                                                                                                            SHA256

                                                                                                            daf73263be5c4dfd80ed241d34c50eb5cf18363415594cd1540192d3baa4d71d

                                                                                                            SHA512

                                                                                                            7a5b300334f28bfae99ec04dcda0430bbc2f6ff648a28c89ab566958e1849971ded967e2c72d88b56fb444a8259cc6107d6cdea6c03037948e0717625254d5ae

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                            Filesize

                                                                                                            816B

                                                                                                            MD5

                                                                                                            19a857d86f92cf51babaf6ce88b926d7

                                                                                                            SHA1

                                                                                                            d4e81f43da36aa9ff1eaa4f0271569673e7b207d

                                                                                                            SHA256

                                                                                                            debe29571c25cb6b8967e47830c0bb91238f37cacf935d1eda3ec3d9c81128de

                                                                                                            SHA512

                                                                                                            1c34dca3a2801c7655cefb874771e4d968ebeb86720a4547f11773c6a08bf6bc9a53c0d30a6c47dcd803aa130dc05455634ca350e80ee0d7e4c5ec9c653e99e9

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                            Filesize

                                                                                                            768B

                                                                                                            MD5

                                                                                                            8d5a7f7400652ae2db4408387e3191c9

                                                                                                            SHA1

                                                                                                            a44eb3acb9c767c4df689d0ef4f801bb620110bc

                                                                                                            SHA256

                                                                                                            aef6bea2002e091b8e72fa713e2183fdd2d18dad36797d6de766655e2f73322e

                                                                                                            SHA512

                                                                                                            a7370e65395fb4da5f20e2f41812c3d64efed803087a9eb50703618b299b54bc7f418764fe46f0cb2104d452f3aa63da72d6cae11aa35bc8e747f6c0ee9d3b01

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                            Filesize

                                                                                                            3KB

                                                                                                            MD5

                                                                                                            fda4a61e19701cef0f4e0ca4a2094fad

                                                                                                            SHA1

                                                                                                            d9e805154f165aa5e848c42f71fd4f611a82f7ae

                                                                                                            SHA256

                                                                                                            7b8b1d1ec20419de8628203c2ee87e7c84e18e2b22444e3f3965eac9b03a1fb9

                                                                                                            SHA512

                                                                                                            c4cad6edc4b5716fecc54f780303ed8858eacbae185976ec26a5dd75708a0101146513a553b1fc6dff3ed52ba194236ed049b71d07b3812a1b7f964be8534631

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                            Filesize

                                                                                                            111B

                                                                                                            MD5

                                                                                                            285252a2f6327d41eab203dc2f402c67

                                                                                                            SHA1

                                                                                                            acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                                                                            SHA256

                                                                                                            5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                                                                            SHA512

                                                                                                            11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                            Filesize

                                                                                                            2KB

                                                                                                            MD5

                                                                                                            2cfa6274ca751e50c1f5dd8a9f491d1a

                                                                                                            SHA1

                                                                                                            bb463d168aa39361a9dce4d8c35d04930362c638

                                                                                                            SHA256

                                                                                                            51beafe0693d3f39a36ccbfbd32ac232d214061d427761d9aa18a2dbbec3b4f4

                                                                                                            SHA512

                                                                                                            c7a3fdc1add48adca6742f9e2da427ed42439d698435847808a33545c2444b9db2387ccfe606387dc5e9cae2e89adf73bb32e21096147a405753bbab8d1e9185

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                            Filesize

                                                                                                            2KB

                                                                                                            MD5

                                                                                                            6e989fcb992b07d257057f0d0b2db5cd

                                                                                                            SHA1

                                                                                                            88ad89a52be71be48ec45645da1ab5445ce9d697

                                                                                                            SHA256

                                                                                                            1ce25abee725810758668a4133fcaeeffc7dbe93a84c03ace1ff704fe6cd561b

                                                                                                            SHA512

                                                                                                            a719569a850cfd03dce0939005ce4e8cf0dedd349696ce995008ea1487eb8dce8d180e11138cbeb5c12993f4761e5cba727cc44e03ff74a7724b7f884401230b

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            7KB

                                                                                                            MD5

                                                                                                            c07af6a85ceda5358bfb633ef5702598

                                                                                                            SHA1

                                                                                                            d53c76241feb141055690bf9ed020d1fca3db163

                                                                                                            SHA256

                                                                                                            1b93eb3fa95f1816551ce5a0f16af09ca4977a540816f7dfb4bf27761f4ffd79

                                                                                                            SHA512

                                                                                                            4dc9287c70d3d0eb6a43b65b38fc5069e8aa9664bf4f576902de3a9b504e00623cdda2839a56560a16f5518b3d43d70f717a26fc5a3bbdba026f26c354fe956b

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            7KB

                                                                                                            MD5

                                                                                                            767d02b43157de9763ba8f225830b6cb

                                                                                                            SHA1

                                                                                                            3fb301ad34a0eda9d563c88b2d03634000881927

                                                                                                            SHA256

                                                                                                            cd3f171723d79267d5cde65bd86fe202dc0ab286eb39899e8bd938bdced6bbdc

                                                                                                            SHA512

                                                                                                            b628557199c7fb74dc6dcbc8f2c6e4d2ef5213f42fdf21c448cadc6ad690a1a46aadf401e4bb0a6d36181d43c7c28ddce6213aff9dbce165c56eca4e81763aff

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            8KB

                                                                                                            MD5

                                                                                                            80eb8d514f691c9d5335e4c5f69dc12e

                                                                                                            SHA1

                                                                                                            b77da26cbdafce58674dfda6fe28a959f8bc096d

                                                                                                            SHA256

                                                                                                            2e3390a5134b89b8ceb21ea974325a46a822c619b21fb81c3e7565a001804d0c

                                                                                                            SHA512

                                                                                                            61d5f077c58da769403c067bfe4181aeb0f9fe6c15c37f5737647634ab4fff7f7933044edb0e92c635b4011bf5d58b8fe898ac23152792fe965b70d32be8ece0

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            5KB

                                                                                                            MD5

                                                                                                            5f1ff76e4eb9edaa03d8070c8f4ebd86

                                                                                                            SHA1

                                                                                                            271d9144fa9ecaf2c40d07e86b954d6f23b6a609

                                                                                                            SHA256

                                                                                                            8d03cbb1763190cd7cfd3fb93febb8a83ca169eb9e82c33a56c13541e79a1cfb

                                                                                                            SHA512

                                                                                                            5e8aab6f0ebb138400b01c6fd741081f8b2742de1ac0f913ded7c840cce4c49bbef0e39b8f9fc20a8d0efe965107ee59c6ee75f8a8f81918eb45fe61fc3c8332

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                            Filesize

                                                                                                            7KB

                                                                                                            MD5

                                                                                                            59cd0daa669d0c8b5668b1550181b5e9

                                                                                                            SHA1

                                                                                                            c43f8a28387bd6bf9fbb974999f8e4dda3c44e13

                                                                                                            SHA256

                                                                                                            765328daffa4a0dedb46137c4a1c9e11698c2c2735339772f112b502b531dab5

                                                                                                            SHA512

                                                                                                            ee1a3ba203b383972825abbcf9aa9890ea018d386ffd14d7f5ca7ca0d4a22d20e1bc4fc87678b5d10a8bb1df62ed73f84a109e87f4c7f3668205f51dfeb9a556

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                                            Filesize

                                                                                                            24KB

                                                                                                            MD5

                                                                                                            da9131b2f8a151462d1144bf57ab14ed

                                                                                                            SHA1

                                                                                                            5c9a951616ec2347e415de0c2c646dd9896c21e4

                                                                                                            SHA256

                                                                                                            6c8f728a738707d0b8d056c3692a6561e305d93f0ded75a33e845fb057814b9d

                                                                                                            SHA512

                                                                                                            f0d3e4bcbc7239441e46b13fe889a80212033a999206c0e68c3b329d36b3acc7ad8cc08b41e75badc7d4bde1fcf08f86da6f26cc32b46ab071a663fd41c42033

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                            Filesize

                                                                                                            707B

                                                                                                            MD5

                                                                                                            b8d43828eb7f5eb3fe7bb58cd4a7f8a2

                                                                                                            SHA1

                                                                                                            f8e81c6cdde398bbde087519b9a193533fd78fb9

                                                                                                            SHA256

                                                                                                            046317dc547ef131c71d151abbe7e80c3e71adaba2788157b5161c72129a923b

                                                                                                            SHA512

                                                                                                            459e762b9873bf08fe30006200059b329c535c4aab858d6805692d91455126d493adc460ffabe62c43a8b37337b32efc49499463ab079307eefb50391d5cd83d

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                            Filesize

                                                                                                            707B

                                                                                                            MD5

                                                                                                            9bdce5f2ed25297b992f65e22bbbd5b1

                                                                                                            SHA1

                                                                                                            cbbfb5c0722e579cdb8005e3ca9a93fb4313fc06

                                                                                                            SHA256

                                                                                                            a043d67d32356be1107dea87c56f7427171e2826a3fb50f5fd233af4521108c4

                                                                                                            SHA512

                                                                                                            ea18dd2b8133b5685f1273e614eb253e2186bcafc1ed17dbb513edf3ada25eb2b5f7e45ca0b9cefbb9e728a047c3ad441f8a0a4e35379774e75ee3dfc87abb77

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5b9fe6.TMP

                                                                                                            Filesize

                                                                                                            539B

                                                                                                            MD5

                                                                                                            b6027c6a5f503271b746b29ede058170

                                                                                                            SHA1

                                                                                                            44329d3fdf1331960f41ecbee3daf8effe4eb690

                                                                                                            SHA256

                                                                                                            e33b80915040f3a83a98e418bcb2d9691c0624778cfadc7ff7e7778f7b53958a

                                                                                                            SHA512

                                                                                                            71ed4b6e4beb0004a31fd0de878fee50f703a1c44f4661f7a57ef47e9299e33c387ffa0dede76829b9ac904f382ff5095265e300c6391ab4482935a6bdae6d85

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                            Filesize

                                                                                                            16B

                                                                                                            MD5

                                                                                                            6752a1d65b201c13b62ea44016eb221f

                                                                                                            SHA1

                                                                                                            58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                            SHA256

                                                                                                            0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                            SHA512

                                                                                                            9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                            Filesize

                                                                                                            11KB

                                                                                                            MD5

                                                                                                            c95c47dec10bc5978561343d01658e7a

                                                                                                            SHA1

                                                                                                            464e5dc737e23e0397401d789e2763205965e50f

                                                                                                            SHA256

                                                                                                            2d8be4e388b11dc04a7858f36d7114d523cd39d87eb7e2374c03b2688ac0b1e0

                                                                                                            SHA512

                                                                                                            9f152e2bd82244f642097db2e152435fd896121ad20fa6f4db9af969621470c6677a2f0aadd98524fa80afb5a13979928fd5cf6e5a554dd08aff52b6f5be89e8

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                            Filesize

                                                                                                            11KB

                                                                                                            MD5

                                                                                                            9204cd509c5bb3e4d1f39eb22d03d5be

                                                                                                            SHA1

                                                                                                            2e77449b7b8fdfd95f02560e165830b18ac6fcce

                                                                                                            SHA256

                                                                                                            8f60bfdf84888887b85913faa1af5ceeb89c1811920448d559b53d79b96d4dbf

                                                                                                            SHA512

                                                                                                            170c0228d52f7f75a2357d4239cfe80ccb7035a5f176e9ba168f4083c8c65f6f9a181e9a6f7536a7d07aaa267167f145bc62f50eb8c1c5ae9b8915fb935c3894

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                            Filesize

                                                                                                            11KB

                                                                                                            MD5

                                                                                                            4e18bc80f30f625af3bdacae544cdb2d

                                                                                                            SHA1

                                                                                                            e845496878a41c6f465a53425be8e280fac92a57

                                                                                                            SHA256

                                                                                                            e79fe1a32e818368bfcb2c2a8dfba2c4420a8be7e8b25264cbf93f1f5d9fa7c9

                                                                                                            SHA512

                                                                                                            b1b0a2dcc9433bfc7f5499270bd4e0f865bd865d7568c048170ca29a0be17f730f433b671544939d7dc5078fbfa89df78cd23ee207380bd3052e9c92e23c79f0

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                            Filesize

                                                                                                            11KB

                                                                                                            MD5

                                                                                                            71090cee98537d213218be971826de8b

                                                                                                            SHA1

                                                                                                            59c06f531798afeb691257d2a118171052ab1563

                                                                                                            SHA256

                                                                                                            524e77b02460d3e9b0591a387ec7666f9ee14b8c7792d3e0fc4719ce26f87a35

                                                                                                            SHA512

                                                                                                            4ce693430402d7dee7fb14b916d63f89f44848f6dc578d0656f97a6375bdfe7fe42a0648389723690f9f132c33972e234bbb9e097c269774da5dc9a0f677f709

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                            Filesize

                                                                                                            10KB

                                                                                                            MD5

                                                                                                            bb68886d93a48481abb7321ea3ca8baf

                                                                                                            SHA1

                                                                                                            cb8e386ca4576fee7b8e215e92567eb1522b12b7

                                                                                                            SHA256

                                                                                                            178eee5845d217ebea089e478cd54bef7ce0ff4ad3a7fa9be03e499a03d27358

                                                                                                            SHA512

                                                                                                            219416148b84967d8f19a6432947cd4425ed72fb154f3500ecd7e1b954bada6e46736b6799660c52d02ab0e9947a88efee65eb200b77388a4f94498dc9e63fb0

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                            Filesize

                                                                                                            10KB

                                                                                                            MD5

                                                                                                            5f913fa115b0f2a1e8495ba2e69f7b1f

                                                                                                            SHA1

                                                                                                            f9bd7df68e5fda7418706d4818062133152b3576

                                                                                                            SHA256

                                                                                                            ba4f62b05faca21c12cbdb5dddebf43c207dbb0229219000e9ba4fbf4db95d00

                                                                                                            SHA512

                                                                                                            3133778eca82a4ccff6f0d902cae2966fac73271d5b09a4f5c21c037a5c70b26789d0cb5e482eed3875fc568abd10ba2488ed9c9e4b1967cef51a08ead46424a

                                                                                                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                            Filesize

                                                                                                            11KB

                                                                                                            MD5

                                                                                                            3b26f36189bb216f13f00f162785694c

                                                                                                            SHA1

                                                                                                            f78c5395672d62914cb09e87bedebccbb74dfcbb

                                                                                                            SHA256

                                                                                                            b7a18f7da14f5660853e6ef052bec5675ac997d16ea557810514cb1a6844eb7f

                                                                                                            SHA512

                                                                                                            ccbc346b635a1dc4308053b282afb055e3af1c16b912666eb0218fcddc849479a108e0d007cb759beaa556f1e0829f0ab0d2be0dbf85a04b53a289aba73d0cae

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rcczy1qh.zsh.ps1

                                                                                                            Filesize

                                                                                                            60B

                                                                                                            MD5

                                                                                                            d17fe0a3f47be24a6453e9ef58c94641

                                                                                                            SHA1

                                                                                                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                            SHA256

                                                                                                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                            SHA512

                                                                                                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-OE8JD.tmp\butterflyondesktop.tmp

                                                                                                            Filesize

                                                                                                            688KB

                                                                                                            MD5

                                                                                                            c765336f0dcf4efdcc2101eed67cd30c

                                                                                                            SHA1

                                                                                                            fa0279f59738c5aa3b6b20106e109ccd77f895a7

                                                                                                            SHA256

                                                                                                            c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28

                                                                                                            SHA512

                                                                                                            06a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891

                                                                                                          • C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.new

                                                                                                            Filesize

                                                                                                            13.3MB

                                                                                                            MD5

                                                                                                            2b7e3911d34114aef741abc1fd9fb93b

                                                                                                            SHA1

                                                                                                            bbf9b2d0b497e13afadc47a11ff8073b6eb8fc12

                                                                                                            SHA256

                                                                                                            36a2ef672e590db510bdf93a29a35c25ddc7b1c4f54daeb8585e133d6822b399

                                                                                                            SHA512

                                                                                                            3d3a0a6e190fba8bc4c9d32fd8be37a493244cc8dcd5333f83d82cd61cbf24f659c0135a2d5355b20afd34e3b042699b73d2548c83df0397f1a0bde888c08132

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master.zip

                                                                                                            Filesize

                                                                                                            45.4MB

                                                                                                            MD5

                                                                                                            ef37386fefe6fbbf646805a591add083

                                                                                                            SHA1

                                                                                                            1abfc73d9a379c796036de72e5f7961b4295bf5e

                                                                                                            SHA256

                                                                                                            2ca4803498d7d375a61bfab2a3a4cf7e0eec41d116e50a838791a55b164e0f8c

                                                                                                            SHA512

                                                                                                            112cccdada7554db108f3fd469e72fc0568aadbcad33b75a2046018827c5542d5fdcb6b454eb7bb0f58a6ea00e65bcd503a807222e1f21cc9a0f087c89453d3e

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\@[email protected]

                                                                                                            Filesize

                                                                                                            933B

                                                                                                            MD5

                                                                                                            7e6b6da7c61fcb66f3f30166871def5b

                                                                                                            SHA1

                                                                                                            00f699cf9bbc0308f6e101283eca15a7c566d4f9

                                                                                                            SHA256

                                                                                                            4a25d98c121bb3bd5b54e0b6a5348f7b09966bffeec30776e5a731813f05d49e

                                                                                                            SHA512

                                                                                                            e5a56137f325904e0c7de1d0df38745f733652214f0cdb6ef173fa0743a334f95bed274df79469e270c9208e6bdc2e6251ef0cdd81af20fa1897929663e2c7d3

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\b.wnry

                                                                                                            Filesize

                                                                                                            1.4MB

                                                                                                            MD5

                                                                                                            c17170262312f3be7027bc2ca825bf0c

                                                                                                            SHA1

                                                                                                            f19eceda82973239a1fdc5826bce7691e5dcb4fb

                                                                                                            SHA256

                                                                                                            d5e0e8694ddc0548d8e6b87c83d50f4ab85c1debadb106d6a6a794c3e746f4fa

                                                                                                            SHA512

                                                                                                            c6160fd03ad659c8dd9cf2a83f9fdcd34f2db4f8f27f33c5afd52aced49dfa9ce4909211c221a0479dbbb6e6c985385557c495fc04d3400ff21a0fbbae42ee7c

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\c.wnry

                                                                                                            Filesize

                                                                                                            780B

                                                                                                            MD5

                                                                                                            93f33b83f1f263e2419006d6026e7bc1

                                                                                                            SHA1

                                                                                                            1a4b36c56430a56af2e0ecabd754bf00067ce488

                                                                                                            SHA256

                                                                                                            ef0ed0b717d1b956eb6c42ba1f4fd2283cf7c8416bed0afd1e8805ee0502f2b4

                                                                                                            SHA512

                                                                                                            45bdd1a9a3118ee4d3469ee65a7a8fdb0f9315ca417821db058028ffb0ed145209f975232a9e64aba1c02b9664c854232221eb041d09231c330ae510f638afac

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_bulgarian.wnry

                                                                                                            Filesize

                                                                                                            46KB

                                                                                                            MD5

                                                                                                            95673b0f968c0f55b32204361940d184

                                                                                                            SHA1

                                                                                                            81e427d15a1a826b93e91c3d2fa65221c8ca9cff

                                                                                                            SHA256

                                                                                                            40b37e7b80cf678d7dd302aaf41b88135ade6ddf44d89bdba19cf171564444bd

                                                                                                            SHA512

                                                                                                            7601f1883edbb4150a9dc17084012323b3bfa66f6d19d3d0355cf82b6a1c9dce475d758da18b6d17a8b321bf6fca20915224dbaedcb3f4d16abfaf7a5fc21b92

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_chinese (simplified).wnry

                                                                                                            Filesize

                                                                                                            53KB

                                                                                                            MD5

                                                                                                            0252d45ca21c8e43c9742285c48e91ad

                                                                                                            SHA1

                                                                                                            5c14551d2736eef3a1c1970cc492206e531703c1

                                                                                                            SHA256

                                                                                                            845d0e178aeebd6c7e2a2e9697b2bf6cf02028c50c288b3ba88fe2918ea2834a

                                                                                                            SHA512

                                                                                                            1bfcf6c0e7c977d777f12bd20ac347630999c4d99bd706b40de7ff8f2f52e02560d68093142cc93722095657807a1480ce3fb6a2e000c488550548c497998755

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_chinese (traditional).wnry

                                                                                                            Filesize

                                                                                                            77KB

                                                                                                            MD5

                                                                                                            2efc3690d67cd073a9406a25005f7cea

                                                                                                            SHA1

                                                                                                            52c07f98870eabace6ec370b7eb562751e8067e9

                                                                                                            SHA256

                                                                                                            5c7f6ad1ec4bc2c8e2c9c126633215daba7de731ac8b12be10ca157417c97f3a

                                                                                                            SHA512

                                                                                                            0766c58e64d9cda5328e00b86f8482316e944aa2c26523a3c37289e22c34be4b70937033bebdb217f675e40db9fecdce0a0d516f9065a170e28286c2d218487c

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_croatian.wnry

                                                                                                            Filesize

                                                                                                            38KB

                                                                                                            MD5

                                                                                                            17194003fa70ce477326ce2f6deeb270

                                                                                                            SHA1

                                                                                                            e325988f68d327743926ea317abb9882f347fa73

                                                                                                            SHA256

                                                                                                            3f33734b2d34cce83936ce99c3494cd845f1d2c02d7f6da31d42dfc1ca15a171

                                                                                                            SHA512

                                                                                                            dcf4ccf0b352a8b271827b3b8e181f7d6502ca0f8c9dda3dc6e53441bb4ae6e77b49c9c947cc3ede0bf323f09140a0c068a907f3c23ea2a8495d1ad96820051c

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_czech.wnry

                                                                                                            Filesize

                                                                                                            39KB

                                                                                                            MD5

                                                                                                            537efeecdfa94cc421e58fd82a58ba9e

                                                                                                            SHA1

                                                                                                            3609456e16bc16ba447979f3aa69221290ec17d0

                                                                                                            SHA256

                                                                                                            5afa4753afa048c6d6c39327ce674f27f5f6e5d3f2a060b7a8aed61725481150

                                                                                                            SHA512

                                                                                                            e007786ffa09ccd5a24e5c6504c8de444929a2faaafad3712367c05615b7e1b0fbf7fbfff7028ed3f832ce226957390d8bf54308870e9ed597948a838da1137b

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_danish.wnry

                                                                                                            Filesize

                                                                                                            36KB

                                                                                                            MD5

                                                                                                            2c5a3b81d5c4715b7bea01033367fcb5

                                                                                                            SHA1

                                                                                                            b548b45da8463e17199daafd34c23591f94e82cd

                                                                                                            SHA256

                                                                                                            a75bb44284b9db8d702692f84909a7e23f21141866adf3db888042e9109a1cb6

                                                                                                            SHA512

                                                                                                            490c5a892fac801b853c348477b1140755d4c53ca05726ac19d3649af4285c93523393a3667e209c71c80ac06ffd809f62dd69ae65012dcb00445d032f1277b3

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_dutch.wnry

                                                                                                            Filesize

                                                                                                            36KB

                                                                                                            MD5

                                                                                                            7a8d499407c6a647c03c4471a67eaad7

                                                                                                            SHA1

                                                                                                            d573b6ac8e7e04a05cbbd6b7f6a9842f371d343b

                                                                                                            SHA256

                                                                                                            2c95bef914da6c50d7bdedec601e589fbb4fda24c4863a7260f4f72bd025799c

                                                                                                            SHA512

                                                                                                            608ef3ff0a517fe1e70ff41aeb277821565c5a9bee5103aa5e45c68d4763fce507c2a34d810f4cd242d163181f8341d9a69e93fe32aded6fbc7f544c55743f12

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_english.wnry

                                                                                                            Filesize

                                                                                                            36KB

                                                                                                            MD5

                                                                                                            fe68c2dc0d2419b38f44d83f2fcf232e

                                                                                                            SHA1

                                                                                                            6c6e49949957215aa2f3dfb72207d249adf36283

                                                                                                            SHA256

                                                                                                            26fd072fda6e12f8c2d3292086ef0390785efa2c556e2a88bd4673102af703e5

                                                                                                            SHA512

                                                                                                            941fa0a1f6a5756ed54260994db6158a7ebeb9e18b5c8ca2f6530c579bc4455918df0b38c609f501ca466b3cc067b40e4b861ad6513373b483b36338ae20a810

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_filipino.wnry

                                                                                                            Filesize

                                                                                                            36KB

                                                                                                            MD5

                                                                                                            08b9e69b57e4c9b966664f8e1c27ab09

                                                                                                            SHA1

                                                                                                            2da1025bbbfb3cd308070765fc0893a48e5a85fa

                                                                                                            SHA256

                                                                                                            d8489f8c16318e524b45de8b35d7e2c3cd8ed4821c136f12f5ef3c9fc3321324

                                                                                                            SHA512

                                                                                                            966b5ed68be6b5ccd46e0de1fa868cfe5432d9bf82e1e2f6eb99b2aef3c92f88d96f4f4eec5e16381b9c6db80a68071e7124ca1474d664bdd77e1817ec600cb4

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_finnish.wnry

                                                                                                            Filesize

                                                                                                            37KB

                                                                                                            MD5

                                                                                                            35c2f97eea8819b1caebd23fee732d8f

                                                                                                            SHA1

                                                                                                            e354d1cc43d6a39d9732adea5d3b0f57284255d2

                                                                                                            SHA256

                                                                                                            1adfee058b98206cb4fbe1a46d3ed62a11e1dee2c7ff521c1eef7c706e6a700e

                                                                                                            SHA512

                                                                                                            908149a6f5238fcccd86f7c374986d486590a0991ef5243f0cd9e63cc8e208158a9a812665233b09c3a478233d30f21e3d355b94f36b83644795556f147345bf

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_french.wnry

                                                                                                            Filesize

                                                                                                            37KB

                                                                                                            MD5

                                                                                                            4e57113a6bf6b88fdd32782a4a381274

                                                                                                            SHA1

                                                                                                            0fccbc91f0f94453d91670c6794f71348711061d

                                                                                                            SHA256

                                                                                                            9bd38110e6523547aed50617ddc77d0920d408faeed2b7a21ab163fda22177bc

                                                                                                            SHA512

                                                                                                            4f1918a12269c654d44e9d394bc209ef0bc32242be8833a2fba437b879125177e149f56f2fb0c302330dec328139b34982c04b3fefb045612b6cc9f83ec85aa9

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_german.wnry

                                                                                                            Filesize

                                                                                                            36KB

                                                                                                            MD5

                                                                                                            3d59bbb5553fe03a89f817819540f469

                                                                                                            SHA1

                                                                                                            26781d4b06ff704800b463d0f1fca3afd923a9fe

                                                                                                            SHA256

                                                                                                            2adc900fafa9938d85ce53cb793271f37af40cf499bcc454f44975db533f0b61

                                                                                                            SHA512

                                                                                                            95719ae80589f71209bb3cb953276538040e7111b994d757b0a24283aefe27aadbbe9eef3f1f823ce4cabc1090946d4a2a558607ac6cac6faca5971529b34dac

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_greek.wnry

                                                                                                            Filesize

                                                                                                            47KB

                                                                                                            MD5

                                                                                                            fb4e8718fea95bb7479727fde80cb424

                                                                                                            SHA1

                                                                                                            1088c7653cba385fe994e9ae34a6595898f20aeb

                                                                                                            SHA256

                                                                                                            e13cc9b13aa5074dc45d50379eceb17ee39a0c2531ab617d93800fe236758ca9

                                                                                                            SHA512

                                                                                                            24db377af1569e4e2b2ebccec42564cea95a30f1ff43bcaf25a692f99567e027bcef4aacef008ec5f64ea2eef0c04be88d2b30bcadabb3919b5f45a6633940cb

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_indonesian.wnry

                                                                                                            Filesize

                                                                                                            36KB

                                                                                                            MD5

                                                                                                            3788f91c694dfc48e12417ce93356b0f

                                                                                                            SHA1

                                                                                                            eb3b87f7f654b604daf3484da9e02ca6c4ea98b7

                                                                                                            SHA256

                                                                                                            23e5e738aad10fb8ef89aa0285269aff728070080158fd3e7792fe9ed47c51f4

                                                                                                            SHA512

                                                                                                            b7dd9e6dc7c2d023ff958caf132f0544c76fae3b2d8e49753257676cc541735807b4befdf483bcae94c2dcde3c878c783b4a89dca0fecbc78f5bbf7c356f35cd

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_italian.wnry

                                                                                                            Filesize

                                                                                                            36KB

                                                                                                            MD5

                                                                                                            30a200f78498990095b36f574b6e8690

                                                                                                            SHA1

                                                                                                            c4b1b3c087bd12b063e98bca464cd05f3f7b7882

                                                                                                            SHA256

                                                                                                            49f2c739e7d9745c0834dc817a71bf6676ccc24a4c28dcddf8844093aab3df07

                                                                                                            SHA512

                                                                                                            c0da2aae82c397f6943a0a7b838f60eeef8f57192c5f498f2ecf05db824cfeb6d6ca830bf3715da7ee400aa8362bd64dc835298f3f0085ae7a744e6e6c690511

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_japanese.wnry

                                                                                                            Filesize

                                                                                                            79KB

                                                                                                            MD5

                                                                                                            b77e1221f7ecd0b5d696cb66cda1609e

                                                                                                            SHA1

                                                                                                            51eb7a254a33d05edf188ded653005dc82de8a46

                                                                                                            SHA256

                                                                                                            7e491e7b48d6e34f916624c1cda9f024e86fcbec56acda35e27fa99d530d017e

                                                                                                            SHA512

                                                                                                            f435fd67954787e6b87460db026759410fbd25b2f6ea758118749c113a50192446861a114358443a129be817020b50f21d27b1ebd3d22c7be62082e8b45223fc

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_korean.wnry

                                                                                                            Filesize

                                                                                                            89KB

                                                                                                            MD5

                                                                                                            6735cb43fe44832b061eeb3f5956b099

                                                                                                            SHA1

                                                                                                            d636daf64d524f81367ea92fdafa3726c909bee1

                                                                                                            SHA256

                                                                                                            552aa0f82f37c9601114974228d4fc54f7434fe3ae7a276ef1ae98a0f608f1d0

                                                                                                            SHA512

                                                                                                            60272801909dbba21578b22c49f6b0ba8cd0070f116476ff35b3ac8347b987790e4cc0334724244c4b13415a246e77a577230029e4561ae6f04a598c3f536c7e

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_latvian.wnry

                                                                                                            Filesize

                                                                                                            40KB

                                                                                                            MD5

                                                                                                            c33afb4ecc04ee1bcc6975bea49abe40

                                                                                                            SHA1

                                                                                                            fbea4f170507cde02b839527ef50b7ec74b4821f

                                                                                                            SHA256

                                                                                                            a0356696877f2d94d645ae2df6ce6b370bd5c0d6db3d36def44e714525de0536

                                                                                                            SHA512

                                                                                                            0d435f0836f61a5ff55b78c02fa47b191e5807a79d8a6e991f3115743df2141b3db42ba8bdad9ad259e12f5800828e9e72d7c94a6a5259312a447d669b03ec44

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_norwegian.wnry

                                                                                                            Filesize

                                                                                                            36KB

                                                                                                            MD5

                                                                                                            ff70cc7c00951084175d12128ce02399

                                                                                                            SHA1

                                                                                                            75ad3b1ad4fb14813882d88e952208c648f1fd18

                                                                                                            SHA256

                                                                                                            cb5da96b3dfcf4394713623dbf3831b2a0b8be63987f563e1c32edeb74cb6c3a

                                                                                                            SHA512

                                                                                                            f01df3256d49325e5ec49fd265aa3f176020c8ffec60eb1d828c75a3fa18ff8634e1de824d77dfdd833768acff1f547303104620c70066a2708654a07ef22e19

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_polish.wnry

                                                                                                            Filesize

                                                                                                            38KB

                                                                                                            MD5

                                                                                                            e79d7f2833a9c2e2553c7fe04a1b63f4

                                                                                                            SHA1

                                                                                                            3d9f56d2381b8fe16042aa7c4feb1b33f2baebff

                                                                                                            SHA256

                                                                                                            519ad66009a6c127400c6c09e079903223bd82ecc18ad71b8e5cd79f5f9c053e

                                                                                                            SHA512

                                                                                                            e0159c753491cac7606a7250f332e87bc6b14876bc7a1cf5625fa56ab4f09c485f7b231dd52e4ff0f5f3c29862afb1124c0efd0741613eb97a83cbe2668af5de

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_portuguese.wnry

                                                                                                            Filesize

                                                                                                            37KB

                                                                                                            MD5

                                                                                                            fa948f7d8dfb21ceddd6794f2d56b44f

                                                                                                            SHA1

                                                                                                            ca915fbe020caa88dd776d89632d7866f660fc7a

                                                                                                            SHA256

                                                                                                            bd9f4b3aedf4f81f37ec0a028aabcb0e9a900e6b4de04e9271c8db81432e2a66

                                                                                                            SHA512

                                                                                                            0d211bfb0ae953081dca00cd07f8c908c174fd6c47a8001fadc614203f0e55d9fbb7fa9b87c735d57101341ab36af443918ee00737ed4c19ace0a2b85497f41a

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_romanian.wnry

                                                                                                            Filesize

                                                                                                            50KB

                                                                                                            MD5

                                                                                                            313e0ececd24f4fa1504118a11bc7986

                                                                                                            SHA1

                                                                                                            e1b9ae804c7fb1d27f39db18dc0647bb04e75e9d

                                                                                                            SHA256

                                                                                                            70c0f32ed379ae899e5ac975e20bbbacd295cf7cd50c36174d2602420c770ac1

                                                                                                            SHA512

                                                                                                            c7500363c61baf8b77fce796d750f8f5e6886ff0a10f81c3240ea3ad4e5f101b597490dea8ab6bd9193457d35d8fd579fce1b88a1c8d85ebe96c66d909630730

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_russian.wnry

                                                                                                            Filesize

                                                                                                            46KB

                                                                                                            MD5

                                                                                                            452615db2336d60af7e2057481e4cab5

                                                                                                            SHA1

                                                                                                            442e31f6556b3d7de6eb85fbac3d2957b7f5eac6

                                                                                                            SHA256

                                                                                                            02932052fafe97e6acaaf9f391738a3a826f5434b1a013abbfa7a6c1ade1e078

                                                                                                            SHA512

                                                                                                            7613dc329abe7a3f32164c9a6b660f209a84b774ab9c008bf6503c76255b30ea9a743a6dc49a8de8df0bcb9aea5a33f7408ba27848d9562583ff51991910911f

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_slovak.wnry

                                                                                                            Filesize

                                                                                                            40KB

                                                                                                            MD5

                                                                                                            c911aba4ab1da6c28cf86338ab2ab6cc

                                                                                                            SHA1

                                                                                                            fee0fd58b8efe76077620d8abc7500dbfef7c5b0

                                                                                                            SHA256

                                                                                                            e64178e339c8e10eac17a236a67b892d0447eb67b1dcd149763dad6fd9f72729

                                                                                                            SHA512

                                                                                                            3491ed285a091a123a1a6d61aafbb8d5621ccc9e045a237a2f9c2cf6049e7420eb96ef30fdcea856b50454436e2ec468770f8d585752d73fafd676c4ef5e800a

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_spanish.wnry

                                                                                                            Filesize

                                                                                                            36KB

                                                                                                            MD5

                                                                                                            8d61648d34cba8ae9d1e2a219019add1

                                                                                                            SHA1

                                                                                                            2091e42fc17a0cc2f235650f7aad87abf8ba22c2

                                                                                                            SHA256

                                                                                                            72f20024b2f69b45a1391f0a6474e9f6349625ce329f5444aec7401fe31f8de1

                                                                                                            SHA512

                                                                                                            68489c33ba89edfe2e3aebaacf8ef848d2ea88dcbef9609c258662605e02d12cfa4ffdc1d266fc5878488e296d2848b2cb0bbd45f1e86ef959bab6162d284079

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_swedish.wnry

                                                                                                            Filesize

                                                                                                            37KB

                                                                                                            MD5

                                                                                                            c7a19984eb9f37198652eaf2fd1ee25c

                                                                                                            SHA1

                                                                                                            06eafed025cf8c4d76966bf382ab0c5e1bd6a0ae

                                                                                                            SHA256

                                                                                                            146f61db72297c9c0facffd560487f8d6a2846ecec92ecc7db19c8d618dbc3a4

                                                                                                            SHA512

                                                                                                            43dd159f9c2eac147cbff1dda83f6a83dd0c59d2d7acac35ba8b407a04ec9a1110a6a8737535d060d100ede1cb75078cf742c383948c9d4037ef459d150f6020

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_turkish.wnry

                                                                                                            Filesize

                                                                                                            41KB

                                                                                                            MD5

                                                                                                            531ba6b1a5460fc9446946f91cc8c94b

                                                                                                            SHA1

                                                                                                            cc56978681bd546fd82d87926b5d9905c92a5803

                                                                                                            SHA256

                                                                                                            6db650836d64350bbde2ab324407b8e474fc041098c41ecac6fd77d632a36415

                                                                                                            SHA512

                                                                                                            ef25c3cf4343df85954114f59933c7cc8107266c8bcac3b5ea7718eb74dbee8ca8a02da39057e6ef26b64f1dfccd720dd3bf473f5ae340ba56941e87d6b796c9

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\msg\m_vietnamese.wnry

                                                                                                            Filesize

                                                                                                            91KB

                                                                                                            MD5

                                                                                                            8419be28a0dcec3f55823620922b00fa

                                                                                                            SHA1

                                                                                                            2e4791f9cdfca8abf345d606f313d22b36c46b92

                                                                                                            SHA256

                                                                                                            1f21838b244c80f8bed6f6977aa8a557b419cf22ba35b1fd4bf0f98989c5bdf8

                                                                                                            SHA512

                                                                                                            8fca77e54480aea3c0c7a705263ed8fb83c58974f5f0f62f12cc97c8e0506ba2cdb59b70e59e9a6c44dd7cde6adeeec35b494d31a6a146ff5ba7006136ab9386

                                                                                                          • C:\Users\Admin\Downloads\Malware-1-master\Malware-1-master\r.wnry

                                                                                                            Filesize

                                                                                                            864B

                                                                                                            MD5

                                                                                                            3e0020fc529b1c2a061016dd2469ba96

                                                                                                            SHA1

                                                                                                            c3a91c22b63f6fe709e7c29cafb29a2ee83e6ade

                                                                                                            SHA256

                                                                                                            402751fa49e0cb68fe052cb3db87b05e71c1d950984d339940cf6b29409f2a7c

                                                                                                            SHA512

                                                                                                            5ca3c134201ed39d96d72911c0498bae6f98701513fd7f1dc8512819b673f0ea580510fa94ed9413ccc73da18b39903772a7cbfa3478176181cee68c896e14cf

                                                                                                          • C:\Windows\SystemTemp\msedge_installer.log

                                                                                                            Filesize

                                                                                                            69KB

                                                                                                            MD5

                                                                                                            25b25629d06fcdff24d50f338719bd5f

                                                                                                            SHA1

                                                                                                            e7150c1e108512bc4b8776047ac2831b30bfa03a

                                                                                                            SHA256

                                                                                                            54d680f7d373eb9817008644185bc7f03250e85ce12b1f31ff6c329cfd8a2759

                                                                                                            SHA512

                                                                                                            9d2962dc8849e676da963f4efe18574ec480c2eb19cb4b6e439a8dc222f80ac496c6bd48add8694e8e9f641cc6c3872f4f7348ca8e655502c8da7b171ae550dc

                                                                                                          • C:\Windows\SystemTemp\msedge_installer.log

                                                                                                            Filesize

                                                                                                            97KB

                                                                                                            MD5

                                                                                                            4e01da66f3975cb52e9681916c7d77fa

                                                                                                            SHA1

                                                                                                            2715a21306907d5253de4a40e4941fdcda83da19

                                                                                                            SHA256

                                                                                                            7a15ad8eb1eb2af737d042f42ac98806908d707c87d953ccef3e9639c9ef4093

                                                                                                            SHA512

                                                                                                            ee09ccc8ae663551a44f44b70ee57dd20b1848949ab2d7f0f9a8de7dadd44dcd9e2c4b2c7376517e6162024061c35b6d3383a8e24f0a0f259bee7cabfe05a9e5

                                                                                                          • C:\Windows\SystemTemp\msedge_installer.log

                                                                                                            Filesize

                                                                                                            98KB

                                                                                                            MD5

                                                                                                            397195eb163abedcf8646410f1ba7ff7

                                                                                                            SHA1

                                                                                                            3dfcd0e9ce6b070c762727872f06d06459ea2c10

                                                                                                            SHA256

                                                                                                            6d0059d247bd1cf4fbfdd5518673662e495c5d549d88d2c43d7dd89955a6e3b6

                                                                                                            SHA512

                                                                                                            a7e4938db2017814e749f9462a57087efcddc443329a95c87a88f840b38a8adc14e56e2636b96215b6a2752f1dbea7d0c25148514dd00eaa97d1cd6e7b062331

                                                                                                          • memory/1604-2550-0x0000000006EF0000-0x0000000006F3C000-memory.dmp

                                                                                                            Filesize

                                                                                                            304KB

                                                                                                          • memory/1604-2555-0x0000000073FA0000-0x0000000073FEC000-memory.dmp

                                                                                                            Filesize

                                                                                                            304KB

                                                                                                          • memory/1604-2565-0x0000000007C40000-0x0000000007CE3000-memory.dmp

                                                                                                            Filesize

                                                                                                            652KB

                                                                                                          • memory/1604-2305-0x0000000000EF0000-0x0000000000F47000-memory.dmp

                                                                                                            Filesize

                                                                                                            348KB

                                                                                                          • memory/1604-2292-0x0000000000EF0000-0x0000000000F47000-memory.dmp

                                                                                                            Filesize

                                                                                                            348KB

                                                                                                          • memory/1872-2492-0x0000000007490000-0x0000000007533000-memory.dmp

                                                                                                            Filesize

                                                                                                            652KB

                                                                                                          • memory/1872-2482-0x0000000073FC0000-0x000000007400C000-memory.dmp

                                                                                                            Filesize

                                                                                                            304KB

                                                                                                          • memory/1872-2481-0x00000000065C0000-0x000000000660C000-memory.dmp

                                                                                                            Filesize

                                                                                                            304KB

                                                                                                          • memory/2264-323-0x0000000000400000-0x00000000004BC000-memory.dmp

                                                                                                            Filesize

                                                                                                            752KB

                                                                                                          • memory/2264-316-0x0000000000400000-0x00000000004BC000-memory.dmp

                                                                                                            Filesize

                                                                                                            752KB

                                                                                                          • memory/3812-2383-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                            Filesize

                                                                                                            400KB

                                                                                                          • memory/4448-2255-0x0000000000EF0000-0x0000000000F47000-memory.dmp

                                                                                                            Filesize

                                                                                                            348KB

                                                                                                          • memory/4448-554-0x0000000000EF0000-0x0000000000F47000-memory.dmp

                                                                                                            Filesize

                                                                                                            348KB

                                                                                                          • memory/4448-515-0x0000000000EF0000-0x0000000000F47000-memory.dmp

                                                                                                            Filesize

                                                                                                            348KB

                                                                                                          • memory/4448-512-0x0000000000EF0000-0x0000000000F47000-memory.dmp

                                                                                                            Filesize

                                                                                                            348KB

                                                                                                          • memory/4552-315-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                            Filesize

                                                                                                            80KB

                                                                                                          • memory/4552-260-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                            Filesize

                                                                                                            80KB

                                                                                                          • memory/4552-324-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                            Filesize

                                                                                                            80KB

                                                                                                          • memory/4760-1729-0x0000000000400000-0x000000000070B000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.0MB

                                                                                                          • memory/4760-724-0x0000000000400000-0x000000000070B000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.0MB

                                                                                                          • memory/4760-2403-0x0000000000400000-0x000000000070B000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.0MB

                                                                                                          • memory/4760-555-0x0000000000400000-0x000000000070B000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.0MB

                                                                                                          • memory/4760-2291-0x0000000000400000-0x000000000070B000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.0MB

                                                                                                          • memory/4760-518-0x0000000000400000-0x000000000070B000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.0MB

                                                                                                          • memory/4760-2319-0x0000000000400000-0x000000000070B000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.0MB

                                                                                                          • memory/4896-286-0x0000000000F1A000-0x0000000000F1E000-memory.dmp

                                                                                                            Filesize

                                                                                                            16KB

                                                                                                          • memory/4896-285-0x0000000000EF0000-0x0000000000F47000-memory.dmp

                                                                                                            Filesize

                                                                                                            348KB

                                                                                                          • memory/4896-257-0x0000000000EF0000-0x0000000000F47000-memory.dmp

                                                                                                            Filesize

                                                                                                            348KB

                                                                                                          • memory/4896-258-0x0000000000EF0000-0x0000000000F47000-memory.dmp

                                                                                                            Filesize

                                                                                                            348KB

                                                                                                          • memory/4896-256-0x0000000000F1A000-0x0000000000F1E000-memory.dmp

                                                                                                            Filesize

                                                                                                            16KB

                                                                                                          • memory/5256-873-0x0000000010000000-0x0000000010010000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/5472-769-0x0000000000EF0000-0x0000000000F47000-memory.dmp

                                                                                                            Filesize

                                                                                                            348KB

                                                                                                          • memory/5472-828-0x0000000000EF0000-0x0000000000F47000-memory.dmp

                                                                                                            Filesize

                                                                                                            348KB

                                                                                                          • memory/6408-2394-0x00000000073C0000-0x0000000007463000-memory.dmp

                                                                                                            Filesize

                                                                                                            652KB

                                                                                                          • memory/6408-2370-0x00000000051A0000-0x00000000051B0000-memory.dmp

                                                                                                            Filesize

                                                                                                            64KB

                                                                                                          • memory/6408-2404-0x0000000007940000-0x000000000795E000-memory.dmp

                                                                                                            Filesize

                                                                                                            120KB

                                                                                                          • memory/6408-2393-0x00000000073A0000-0x00000000073BE000-memory.dmp

                                                                                                            Filesize

                                                                                                            120KB

                                                                                                          • memory/6408-2352-0x0000000002620000-0x0000000002656000-memory.dmp

                                                                                                            Filesize

                                                                                                            216KB

                                                                                                          • memory/6408-2399-0x0000000007500000-0x000000000751A000-memory.dmp

                                                                                                            Filesize

                                                                                                            104KB

                                                                                                          • memory/6408-2401-0x0000000007730000-0x000000000777A000-memory.dmp

                                                                                                            Filesize

                                                                                                            296KB

                                                                                                          • memory/6408-2357-0x0000000005120000-0x0000000005142000-memory.dmp

                                                                                                            Filesize

                                                                                                            136KB

                                                                                                          • memory/6408-2358-0x0000000005990000-0x00000000059F6000-memory.dmp

                                                                                                            Filesize

                                                                                                            408KB

                                                                                                          • memory/6408-2359-0x0000000005A10000-0x0000000005A76000-memory.dmp

                                                                                                            Filesize

                                                                                                            408KB

                                                                                                          • memory/6408-2402-0x0000000007820000-0x00000000078B6000-memory.dmp

                                                                                                            Filesize

                                                                                                            600KB

                                                                                                          • memory/6408-2355-0x0000000004E90000-0x0000000004F12000-memory.dmp

                                                                                                            Filesize

                                                                                                            520KB

                                                                                                          • memory/6408-2369-0x0000000005A80000-0x0000000005DD7000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.3MB

                                                                                                          • memory/6408-2374-0x0000000007360000-0x0000000007392000-memory.dmp

                                                                                                            Filesize

                                                                                                            200KB

                                                                                                          • memory/6408-2398-0x0000000007B40000-0x00000000081BA000-memory.dmp

                                                                                                            Filesize

                                                                                                            6.5MB

                                                                                                          • memory/6408-2400-0x0000000007560000-0x000000000756A000-memory.dmp

                                                                                                            Filesize

                                                                                                            40KB

                                                                                                          • memory/6408-2382-0x00000000742D0000-0x000000007431C000-memory.dmp

                                                                                                            Filesize

                                                                                                            304KB

                                                                                                          • memory/6408-2371-0x0000000006110000-0x0000000006212000-memory.dmp

                                                                                                            Filesize

                                                                                                            1.0MB

                                                                                                          • memory/6408-2372-0x0000000006070000-0x000000000608E000-memory.dmp

                                                                                                            Filesize

                                                                                                            120KB

                                                                                                          • memory/6408-2373-0x0000000006230000-0x000000000627C000-memory.dmp

                                                                                                            Filesize

                                                                                                            304KB

                                                                                                          • memory/6408-2354-0x00000000051C0000-0x000000000588A000-memory.dmp

                                                                                                            Filesize

                                                                                                            6.8MB

                                                                                                          • memory/6432-2310-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                            Filesize

                                                                                                            400KB

                                                                                                          • memory/6432-2351-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                            Filesize

                                                                                                            400KB

                                                                                                          • memory/6432-2356-0x0000000000400000-0x0000000000464000-memory.dmp

                                                                                                            Filesize

                                                                                                            400KB

                                                                                                          • memory/6700-2644-0x0000000073FA0000-0x0000000073FEC000-memory.dmp

                                                                                                            Filesize

                                                                                                            304KB

                                                                                                          • memory/6716-2395-0x0000000000EF0000-0x0000000000F47000-memory.dmp

                                                                                                            Filesize

                                                                                                            348KB

                                                                                                          • memory/6716-2415-0x0000000000EF0000-0x0000000000F47000-memory.dmp

                                                                                                            Filesize

                                                                                                            348KB

                                                                                                          • memory/6960-2315-0x0000000073450000-0x0000000073472000-memory.dmp

                                                                                                            Filesize

                                                                                                            136KB

                                                                                                          • memory/6960-2275-0x0000000072A30000-0x0000000072AB2000-memory.dmp

                                                                                                            Filesize

                                                                                                            520KB

                                                                                                          • memory/6960-2277-0x00000000729A0000-0x0000000072A22000-memory.dmp

                                                                                                            Filesize

                                                                                                            520KB

                                                                                                          • memory/6960-2375-0x0000000000880000-0x0000000000B7E000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.0MB

                                                                                                          • memory/6960-2278-0x0000000073450000-0x0000000073472000-memory.dmp

                                                                                                            Filesize

                                                                                                            136KB

                                                                                                          • memory/6960-2276-0x0000000072780000-0x000000007299C000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.1MB

                                                                                                          • memory/6960-2279-0x0000000000880000-0x0000000000B7E000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.0MB

                                                                                                          • memory/6960-2311-0x0000000000880000-0x0000000000B7E000-memory.dmp

                                                                                                            Filesize

                                                                                                            3.0MB

                                                                                                          • memory/6960-2317-0x0000000072700000-0x0000000072777000-memory.dmp

                                                                                                            Filesize

                                                                                                            476KB

                                                                                                          • memory/6960-2316-0x0000000073430000-0x000000007344C000-memory.dmp

                                                                                                            Filesize

                                                                                                            112KB

                                                                                                          • memory/6960-2314-0x0000000072780000-0x000000007299C000-memory.dmp

                                                                                                            Filesize

                                                                                                            2.1MB

                                                                                                          • memory/6960-2313-0x00000000729A0000-0x0000000072A22000-memory.dmp

                                                                                                            Filesize

                                                                                                            520KB

                                                                                                          • memory/6960-2312-0x0000000072A30000-0x0000000072AB2000-memory.dmp

                                                                                                            Filesize

                                                                                                            520KB