Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

18/03/2025, 19:38

250318-ycrjca1kz6 6

18/03/2025, 19:35

250318-ya273a1kx9 9

18/03/2025, 19:32

250318-x86gpsw1hs 6

18/03/2025, 19:31

250318-x8flaaw1gs 3

18/03/2025, 19:29

250318-x7f6es1kt5 10

18/03/2025, 19:25

250318-x5evks1j19 10

18/03/2025, 19:16

250318-xyyn4swzdx 8

18/03/2025, 19:13

250318-xw6a6swzb1 10

18/03/2025, 19:04

250318-xreyeswyfv 8

18/03/2025, 19:00

250318-xntmeawycw 10

Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250314-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    18/03/2025, 19:25

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Trojan/MrsMajors/MrsMajor3.0.exe

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • UAC bypass 3 TTPs 2 IoCs
  • Disables RegEdit via registry modification 1 IoCs
  • Disables Task Manager via registry modification
  • Downloads MZ/PE file 2 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Obfuscated with Agile.Net obfuscator 2 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Drops desktop.ini file(s) 7 IoCs
  • Enumerates connected drives 3 TTPs 46 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 8 IoCs
  • Drops file in Program Files directory 15 IoCs
  • Drops file in Windows directory 16 IoCs
  • Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies data under HKEY_USERS 17 IoCs
  • Modifies registry class 16 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 32 IoCs
  • Suspicious use of SetWindowsHookEx 48 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Trojan/MrsMajors/MrsMajor3.0.exe
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:5600
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x264,0x268,0x26c,0x260,0x288,0x7ffba599f208,0x7ffba599f214,0x7ffba599f220
      2⤵
        PID:2744
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1864,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=2352 /prefetch:3
        2⤵
        • Downloads MZ/PE file
        PID:5964
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2324,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=2320 /prefetch:2
        2⤵
          PID:3956
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2304,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=2484 /prefetch:8
          2⤵
            PID:2952
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3464,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=3616 /prefetch:1
            2⤵
              PID:5596
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3444,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=3772 /prefetch:1
              2⤵
                PID:4572
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5096,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=5128 /prefetch:8
                2⤵
                  PID:1104
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5044,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=5124 /prefetch:8
                  2⤵
                    PID:4408
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=PooledProcess2 --lang=en-US --service-sandbox-type=utility --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5440,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=5040 /prefetch:8
                    2⤵
                      PID:3256
                    • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5876,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=5900 /prefetch:8
                      2⤵
                        PID:6020
                      • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5876,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=5900 /prefetch:8
                        2⤵
                          PID:3928
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6252,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=6256 /prefetch:8
                          2⤵
                            PID:1344
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --always-read-main-dll --field-trial-handle=6048,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=6284 /prefetch:1
                            2⤵
                              PID:2876
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6348,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=6588 /prefetch:8
                              2⤵
                                PID:2512
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6784,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=6796 /prefetch:8
                                2⤵
                                  PID:3136
                                • C:\Users\Admin\Downloads\MrsMajor3.0.exe
                                  "C:\Users\Admin\Downloads\MrsMajor3.0.exe"
                                  2⤵
                                  • Checks computer location settings
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:4696
                                  • C:\Windows\system32\wscript.exe
                                    "C:\Windows\system32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\8482.tmp\8483.tmp\8493.vbs //Nologo
                                    3⤵
                                    • UAC bypass
                                    • Checks computer location settings
                                    • System policy modification
                                    PID:4104
                                    • C:\Users\Admin\AppData\Local\Temp\8482.tmp\eulascr.exe
                                      "C:\Users\Admin\AppData\Local\Temp\8482.tmp\eulascr.exe"
                                      4⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3436
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=604,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=5760 /prefetch:8
                                  2⤵
                                    PID:1628
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6896,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=5924 /prefetch:8
                                    2⤵
                                      PID:1948
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6828,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=6884 /prefetch:8
                                      2⤵
                                        PID:1636
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3676,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=4908 /prefetch:8
                                        2⤵
                                          PID:1012
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --always-read-main-dll --field-trial-handle=6648,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=6528 /prefetch:1
                                          2⤵
                                            PID:2808
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4316,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=5080 /prefetch:8
                                            2⤵
                                              PID:3148
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6412,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=6332 /prefetch:8
                                              2⤵
                                                PID:2924
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --always-read-main-dll --field-trial-handle=6484,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=6496 /prefetch:1
                                                2⤵
                                                  PID:4036
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7004,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=6628 /prefetch:8
                                                  2⤵
                                                    PID:5284
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6428,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=3352 /prefetch:8
                                                    2⤵
                                                      PID:2880
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7052,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=5356 /prefetch:8
                                                      2⤵
                                                        PID:1604
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=3524,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=6472 /prefetch:8
                                                        2⤵
                                                        • Suspicious behavior: EnumeratesProcesses
                                                        PID:3996
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --always-read-main-dll --field-trial-handle=6796,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=5176 /prefetch:1
                                                        2⤵
                                                          PID:5264
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5272,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=6672 /prefetch:8
                                                          2⤵
                                                            PID:4820
                                                          • C:\Users\Admin\Downloads\BossDaMajor.exe
                                                            "C:\Users\Admin\Downloads\BossDaMajor.exe"
                                                            2⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5240
                                                            • C:\Windows\system32\wscript.exe
                                                              "C:\Windows\sysnative\wscript.exe" C:\Users\Admin\AppData\Local\Temp\4F3F.tmp\4F40.vbs
                                                              3⤵
                                                              • Checks computer location settings
                                                              • Drops file in Program Files directory
                                                              PID:5404
                                                              • C:\Windows\System32\notepad.exe
                                                                "C:\Windows\System32\notepad.exe"
                                                                4⤵
                                                                  PID:1916
                                                                • C:\Windows\System32\wscript.exe
                                                                  "C:\Windows\System32\wscript.exe" "C:\Program files\mrsmajor\mrsmajorlauncher.vbs" RunAsAdministrator
                                                                  4⤵
                                                                  • Modifies WinLogon for persistence
                                                                  • Modifies Windows Defender DisableAntiSpyware settings
                                                                  • UAC bypass
                                                                  • Disables RegEdit via registry modification
                                                                  • Checks computer location settings
                                                                  • Modifies system executable filetype association
                                                                  • Drops file in Program Files directory
                                                                  • Access Token Manipulation: Create Process with Token
                                                                  • Modifies Control Panel
                                                                  • Modifies registry class
                                                                  • System policy modification
                                                                  PID:5636
                                                                  • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                                                                    "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" "C:\Program Files\mrsmajor\def_resource\f11.mp4"
                                                                    5⤵
                                                                    • Drops desktop.ini file(s)
                                                                    • Enumerates connected drives
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Modifies registry class
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:4964
                                                                    • C:\Windows\SysWOW64\unregmp2.exe
                                                                      "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
                                                                      6⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:5320
                                                                      • C:\Windows\system32\unregmp2.exe
                                                                        "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
                                                                        7⤵
                                                                        • Enumerates connected drives
                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                        PID:3460
                                                                  • C:\Windows\System32\shutdown.exe
                                                                    "C:\Windows\System32\shutdown.exe" -r -t 03
                                                                    5⤵
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:4332
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6596,i,12136710896181759587,2753392070449825154,262144 --variations-seed-version --mojo-platform-channel-handle=5256 /prefetch:8
                                                              2⤵
                                                                PID:3064
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                              1⤵
                                                                PID:1640
                                                              • C:\Windows\system32\OpenWith.exe
                                                                C:\Windows\system32\OpenWith.exe -Embedding
                                                                1⤵
                                                                • Modifies registry class
                                                                • Suspicious behavior: GetForegroundWindowSpam
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:5316
                                                                • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                                                                  "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Downloads\MrsMajor2.0.7z"
                                                                  2⤵
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Checks processor information in registry
                                                                  • Modifies Internet Explorer settings
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:4848
                                                                  • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                    "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043
                                                                    3⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:2140
                                                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=A08AAC5B6259B243F4EB989444E7B3F4 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:5280
                                                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=F415BDAA9653CBD7901CA94B787D9D74 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=F415BDAA9653CBD7901CA94B787D9D74 --renderer-client-id=2 --mojo-platform-channel-handle=1764 --allow-no-sandbox-job /prefetch:1
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:4408
                                                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=2A274C7F760D965C26E92A85AF3DC001 --mojo-platform-channel-handle=2332 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:5972
                                                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=998EC98042C0BFD0715175614A554661 --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:4952
                                                                    • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe
                                                                      "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=694B88C13264930E9DECEA2EAE5A4905 --mojo-platform-channel-handle=2380 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:2536
                                                              • C:\Windows\System32\CompPkgSrv.exe
                                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                1⤵
                                                                  PID:1996
                                                                • C:\Windows\system32\OpenWith.exe
                                                                  C:\Windows\system32\OpenWith.exe -Embedding
                                                                  1⤵
                                                                  • Modifies registry class
                                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:4148
                                                                • C:\Windows\system32\svchost.exe
                                                                  C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
                                                                  1⤵
                                                                  • Drops file in Windows directory
                                                                  PID:5820
                                                                • C:\Windows\system32\AUDIODG.EXE
                                                                  C:\Windows\system32\AUDIODG.EXE 0x508 0x49c
                                                                  1⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:4232
                                                                • C:\Windows\system32\LogonUI.exe
                                                                  "LogonUI.exe" /flags:0x4 /state0:0xa39d8055 /state1:0x41c64e6d
                                                                  1⤵
                                                                  • Modifies data under HKEY_USERS
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:8

                                                                Network

                                                                MITRE ATT&CK Enterprise v15

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                  Filesize

                                                                  280B

                                                                  MD5

                                                                  0a33713f4320be61de2679c1a601e60e

                                                                  SHA1

                                                                  a0b7dea51f371e0a7766cdcc6463c7ee9509c94e

                                                                  SHA256

                                                                  c2bb2ec86ba57e4a72b66cc3d6bfae3337b86514f71e55833e987783f704193f

                                                                  SHA512

                                                                  3326c7e4df151133806d285d4d43da08d2d9cc6bc15d9645f25b31f127edf0d32af03f3d236622a56e573e7ead2a158a40813d6156e5f375413d808a248972e0

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                  Filesize

                                                                  5KB

                                                                  MD5

                                                                  00131990958d1d22eab9073c412a95b6

                                                                  SHA1

                                                                  78c3c7e0026ef2698c8bb33afeebe903e1c8464d

                                                                  SHA256

                                                                  ab6923d5a765dc2e97a0a70be7f277d09331cd839c40099d6c53d51e8bd05861

                                                                  SHA512

                                                                  5393c65c1653b3eed9972405a22d92dfc92facd4ce3e902c6d78e268cd035bb92ee2619f84c82ef913544010e28df8ea72aeb27d155ff58ea26c0cfe271e2572

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe57c11d.TMP

                                                                  Filesize

                                                                  3KB

                                                                  MD5

                                                                  6b93ee85cb8c18eb9f4dc1af93f6b536

                                                                  SHA1

                                                                  ca553c1ac62d32debe41537d9007e392196137c9

                                                                  SHA256

                                                                  20370f1256859706022338a7865b645125a2eb70c392f0a127f081c7eeed2811

                                                                  SHA512

                                                                  8dcbd22f8ebe28b0f4369241069711d283046535c25d6b34838d6b56e1b8aac938fc7207d4671fe978b024e42997722b13491090d429462cd2c2cf801b24aafb

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\SiteList-Enterprise.json

                                                                  Filesize

                                                                  2B

                                                                  MD5

                                                                  99914b932bd37a50b983c5e7c90ae93b

                                                                  SHA1

                                                                  bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                                  SHA256

                                                                  44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                                  SHA512

                                                                  27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\HubApps

                                                                  Filesize

                                                                  107KB

                                                                  MD5

                                                                  40e2018187b61af5be8caf035fb72882

                                                                  SHA1

                                                                  72a0b7bcb454b6b727bf90da35879b3e9a70621e

                                                                  SHA256

                                                                  b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5

                                                                  SHA512

                                                                  a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  6ab60fcc7d6ab0f4ea4a94a4322fa187

                                                                  SHA1

                                                                  03689fcc34a73bf50d423031cfa7439bdbff18f5

                                                                  SHA256

                                                                  8194f8ed19b505ff462de1215639edc5ad6bbc707ed9a6dccf836457a80da619

                                                                  SHA512

                                                                  fc2d22468dfb47b37a622f023d2029eaac1fbc995f8b8161e7c36a9075737cf04dbb167b8b5728bba0850ea4c38e194b47bc9de27abaf2db9e2226d427c66d4e

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  2d26432b782f586fd7d978e674b8c494

                                                                  SHA1

                                                                  980f06923d9e29036056bfa282a20ca94fc0b4dc

                                                                  SHA256

                                                                  5ef2ff272c37702775e84fd6ed668503a9e56c956b857ca12042b2b6662ffc58

                                                                  SHA512

                                                                  e77b41b7326e2f9bdf59faab9b45a85f2de5ad40ce0bdf826798e38e44059bdc30bfc9f41242e592ca2ea68f062fba7e64b2f6af8b2c0c67d58f636fd61f8003

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                                                  Filesize

                                                                  2B

                                                                  MD5

                                                                  d751713988987e9331980363e24189ce

                                                                  SHA1

                                                                  97d170e1550eee4afc0af065b78cda302a97674c

                                                                  SHA256

                                                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                  SHA512

                                                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Sdch Dictionaries

                                                                  Filesize

                                                                  40B

                                                                  MD5

                                                                  20d4b8fa017a12a108c87f540836e250

                                                                  SHA1

                                                                  1ac617fac131262b6d3ce1f52f5907e31d5f6f00

                                                                  SHA256

                                                                  6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

                                                                  SHA512

                                                                  507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                  Filesize

                                                                  16KB

                                                                  MD5

                                                                  e2a478ea94ca06a9683d18f188e7b486

                                                                  SHA1

                                                                  6d4e382dc70e5b2102c4c590172e2cba01a26151

                                                                  SHA256

                                                                  f858f0618399b4ada1aab8290c0754215ea7c551a9a39d27e4db3332b9717463

                                                                  SHA512

                                                                  25fd66c76bcf7a3e118665e656b712791a4dad67623cd3cfaadb7df3a1ad7f4ed6ad7e82e8e0a6a489618cfd5cb2c12b60696351f6a3a9eb8f522ffe0c3ea750

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                  Filesize

                                                                  17KB

                                                                  MD5

                                                                  da2e06aa38ed77aa1a51f1900aeb3f08

                                                                  SHA1

                                                                  6093bbe2e2551ed83327575af4c33766069fc132

                                                                  SHA256

                                                                  8340ef494c3af2d53000d092da5e33258c8d3802aa4406134692b1d1a21d57cb

                                                                  SHA512

                                                                  07dde0e43be52d4a3b67a44fdd294a0d1701f9a123ee0bbca6b7f8c3fa4abb94e4fcf2f00920ee3021b51db894bd1cb921cc80001da7453cad2fce8ace16a674

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                  Filesize

                                                                  36KB

                                                                  MD5

                                                                  597453cc3e507a58d313cdacabc5852c

                                                                  SHA1

                                                                  87b77f8f39507d5ef5eb31591946a9ef90e46fc4

                                                                  SHA256

                                                                  457b862a576e218cf8dcfa845156feeced855b9dbbca4c0fb1cd1851006bae0a

                                                                  SHA512

                                                                  799016c094811795bc72a801fca7406eb903709d9fbcd7ddba82ef52743ae4d044aa5695a8b01998ca185686168da9c62aece59722eabeae1971ad53d4f84b85

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\Logs\sync_diagnostic.log

                                                                  Filesize

                                                                  22KB

                                                                  MD5

                                                                  a4ee48b3ef9347965a860108aa86e62e

                                                                  SHA1

                                                                  79d903d2db0233528b03564fc3c962ff00bfa3b7

                                                                  SHA256

                                                                  b53f4eab46cf47632579935fe46d4dfc634fd74bc03692182097044fd0095a53

                                                                  SHA512

                                                                  552dbadf1b74554c916a6dbaf6fad3ecdf149908e40f806e4f8df1082d7668ad64f999ab518ce6594ef88ff1d79a4689be17d9f4a88b1ea0ce4b00fb0550b48c

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                  Filesize

                                                                  469B

                                                                  MD5

                                                                  ae6b142145e2b1a7d84aacf12e426fcd

                                                                  SHA1

                                                                  5d27b6954095d91213981645dc83a869504d35ba

                                                                  SHA256

                                                                  621a4f907d988cc3bb8f7b3c0d557115e16da6a253566e86f7b4205403404661

                                                                  SHA512

                                                                  5c3bf1aa8ed6c8b37951d936c8c1a26986eba5d98986143f96e5e2a01f7cc5fd20a6265c61d1cf5a28ba2070df425d1476ea31dad58161ef090dc77b68e3efed

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                  Filesize

                                                                  904B

                                                                  MD5

                                                                  04985959d541e085548070e2cfb16090

                                                                  SHA1

                                                                  ca933937356358b6ad07af573dab03dc95766bb8

                                                                  SHA256

                                                                  6cc81a4f22b1831715ff81dc02eb2705174ec234e3a0f09f9cd0fc1a50ccfb5d

                                                                  SHA512

                                                                  167e676eb29425594b5f38d4ae63b62e9fac305fcf384e58101a4ee2e775202f57238e0ac71fba596edaf57e627dc19d54b007aa93733a9e67847c4e0f5557f0

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                  Filesize

                                                                  18KB

                                                                  MD5

                                                                  a7bee5052999c0791607dfbe7d71e543

                                                                  SHA1

                                                                  7b7e241cf7e66858fb13363a7953f5b525eebcac

                                                                  SHA256

                                                                  0f01dffd795184b1c84dafc65734578b829aa928459c27ff17d848cf627dfc11

                                                                  SHA512

                                                                  b677b9bc227567df4951833aa1348dd4d9234f25ad1f195e0348355c7ec7f18b2d7bf66646edf81f7799948d0b7a45849b8e5c3fd87eb7804befbc0c2f18e06d

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig

                                                                  Filesize

                                                                  19KB

                                                                  MD5

                                                                  41c1930548d8b99ff1dbb64ba7fecb3d

                                                                  SHA1

                                                                  d8acfeaf7c74e2b289be37687f886f50c01d4f2f

                                                                  SHA256

                                                                  16cee17a989167242dd7ee2755721e357dd23bcfcb61f5789cc19deafe7ca502

                                                                  SHA512

                                                                  a684d61324c71ac15f3a907788ab2150f61e7e2b2bf13ca08c14e9822b22336d0d45d9ff2a2a145aa7321d28d6b71408f9515131f8a1bd9f4927b105e6471b75

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                  Filesize

                                                                  55KB

                                                                  MD5

                                                                  85596845a4a4a7027f9b8f4f2af4a9ce

                                                                  SHA1

                                                                  e4aeb48fa118d37c3d3a7f00b60c7ac376d41a08

                                                                  SHA256

                                                                  ab703d151ee0afcc3d3fed341a3264ac64e998fe290416878497021d0bdae222

                                                                  SHA512

                                                                  e91bb51447a6bd4aed013eb74d42cc3e315d3bd7c7a8d20cc2c824bc25b8c365bf6024f9caa4a8f7b505f3b431d74b1c6fd362457838e1e36433528e3cfdf18d

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                  Filesize

                                                                  40KB

                                                                  MD5

                                                                  0a256904910d8732c2fa9f6efec0a39d

                                                                  SHA1

                                                                  cc1ea41682d31b13e004ceb38e9e5a417eba9548

                                                                  SHA256

                                                                  5a23fedf4a25be3d27e07b5880d91e6c2f66d894d9b3bf0052bf3248fe3d946b

                                                                  SHA512

                                                                  5103f4c7938f781ba546f195cfd79df030709eb3cba1e4da5b4ca625b654553b7797c844e75ea650a122e64a5b38b59ac6f473867853cd984d3667309b002855

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                  Filesize

                                                                  50KB

                                                                  MD5

                                                                  4d8cb5076395700c74e4aaa68514406d

                                                                  SHA1

                                                                  8c2ca857b105c084913100b4ef89206dd26348fc

                                                                  SHA256

                                                                  8fd219b3e224af41b8d4a3fde4716b71d198b9df5c9880c56104dbd6e5db0f9a

                                                                  SHA512

                                                                  ecca36871447bc78b2e52379a525a46564e4f50115c39c477c1ad6e899102b98fb1831e5e91c336e1ccfc303371d2a8fc81accb093621af6efbf327ebe637e97

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                  Filesize

                                                                  49KB

                                                                  MD5

                                                                  66ee0f7f0f0cc140a5b51ca4868840e8

                                                                  SHA1

                                                                  18a305440f1600225c0009585d36ac736ea0fa6a

                                                                  SHA256

                                                                  181b6a6cdf38c3123647df35b5b7ebf5ba4a7bd0f03076ebf2335829f6449e9c

                                                                  SHA512

                                                                  67d385794047091e860c27daed95af9f54e056c0c75596f77329ae9d1ef78850306bafcbf41e8301d5d1dd119d72969cc21f9f0d09d1972f7e16e5443e229551

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                  Filesize

                                                                  55KB

                                                                  MD5

                                                                  066a9d6a48fdf546e24e1bc376f323f1

                                                                  SHA1

                                                                  27dbacb8b458832589f1f22affc8dcf80bc123aa

                                                                  SHA256

                                                                  5db1200b48b4c5be47c4bf261c1dff0bb22a3672ba9ce5373e1fa4bf12e7f7a0

                                                                  SHA512

                                                                  4f9184a4559e217c31c7ec336d1f30c722429a58d7f139efebaeff8f9e367dddc6c76654d5fd4f24ebc19cb61ee865c8c3aaa51c409ecb0d096820b580674a77

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                  Filesize

                                                                  55KB

                                                                  MD5

                                                                  259d8a0b690b9d993babcf43c63f30f4

                                                                  SHA1

                                                                  395ea7bf11f2f39741a1d5b3c8c18c7d2d611c3c

                                                                  SHA256

                                                                  7c079e2fc164163e1ecc5107c324a041b93d1cbd6fafa7c866ff002bf1548fba

                                                                  SHA512

                                                                  8c83b7bc06550ab51edc46875e81f58f819e8b6202bf64781640301f00adeed3ef445fcc01c8572b18d4ed55d4f881c5f41c07beebe09bb27e9125bb38f59598

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\RevisitationBloomfilter

                                                                  Filesize

                                                                  392B

                                                                  MD5

                                                                  6317fbbc9d0045951b659fcb58d2c949

                                                                  SHA1

                                                                  7c79650df64ae7167e3a450d83218a37f54217c9

                                                                  SHA256

                                                                  b628ede61770be39dcc263bc6be8bef1a5fc6c4854f899b5d34be806735ef6f2

                                                                  SHA512

                                                                  f5284d99d4a00a14eee0ed3aa4aa0b4bf4f52c370670d9dcc57e4cdfb839534f78f16b85f2791d5096f268c00e32e4677f8b5000a2d41c8de60c2dba523044c1

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\RevisitationBloomfilter~RFe593e86.TMP

                                                                  Filesize

                                                                  392B

                                                                  MD5

                                                                  b0c7c04553deb640bc09aea733410b46

                                                                  SHA1

                                                                  9ce280e2f9e29fd965e537de83b2eff9729dd832

                                                                  SHA256

                                                                  44398b2d674b5bc381aa38b53b3454d5838fd04c87eeb014bb5aa9b97226f862

                                                                  SHA512

                                                                  240edf01121674412618f603ba6a5dc50950edac62243df4b444ee80f1ab8b62e86e5fbdbebf609247d3045842c70ae921f5fae7a514279eb6b25de32685a3e8

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Well Known Domains\1.2.0.0\well_known_domains.dll

                                                                  Filesize

                                                                  572KB

                                                                  MD5

                                                                  f5f5b37fd514776f455864502c852773

                                                                  SHA1

                                                                  8d5ed434173fd77feb33cb6cb0fad5e2388d97c6

                                                                  SHA256

                                                                  2778063e5ded354d852004e80492edb3a0f731b838bb27ba3a233bc937592f6e

                                                                  SHA512

                                                                  b0931f1cae171190e6ec8880f4d560cc7b3d5bffe1db11525bd133eaf51e2e0b3c920ea194d6c7577f95e7b4b4380f7845c82eb2898ad1f5c35d4550f93a14b6

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                                                                  Filesize

                                                                  64KB

                                                                  MD5

                                                                  7274519b90baf3590f377b694db0acfe

                                                                  SHA1

                                                                  abfc5890aa7a037e159373c91f1ed2183a927a3b

                                                                  SHA256

                                                                  a7ce91327cc6d6ba37e7ed1a723dde3029dee48c987aa58f1c0e0914f1f9f967

                                                                  SHA512

                                                                  ad9e4df80dcbba44eb534177181ba976e7b71baa2ab4913d642cae080c7e98d91f6d4359060573df05f6d832003551c2f054eac001be8a376376cd37456bb81d

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                                                                  Filesize

                                                                  1024KB

                                                                  MD5

                                                                  1f73bd6a700c15b306c887d14d1512aa

                                                                  SHA1

                                                                  00350542a24b3428015ce7b0b48c750cbe44edea

                                                                  SHA256

                                                                  1b6cd0a08b4c9931d0b78e8dd94e282e80eb9deee4872ddc0c0e91a1754ad9eb

                                                                  SHA512

                                                                  ad64729d2cbc2adcf0999ee49db51f0daebef11dfc206305365e08d747265f36b80c30fd16f6bd9113c188088a9336b58da3dc357bd250f745743e110ac17bd8

                                                                • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

                                                                  Filesize

                                                                  68KB

                                                                  MD5

                                                                  1f07e7ec404e976b0228c17b9a5b3279

                                                                  SHA1

                                                                  18812b547766ebe24c5bac5a414e2da0aa501210

                                                                  SHA256

                                                                  4ccfe5d4fde6f3834a16df1d70a88dc540fd5c518422750037479a704024c721

                                                                  SHA512

                                                                  710fe255eb277db121f1078ada8bcea2900225d40d7de65763f80b131282fc479eb0276dbaba4971b385f23b83cdf4ffeaa50b8a89a7e7fcac060315eaaf52e1

                                                                • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  91a103b07506b351dab58471f0ac9c54

                                                                  SHA1

                                                                  59233a83fb8aec324135deb5d44aa6a3bf1160c2

                                                                  SHA256

                                                                  a9d710d775e512eb9f8d6e59ffa8382067f528274158a21f937c2b9f924aeb2b

                                                                  SHA512

                                                                  8e92f1aed52b9d900d2bc705014d4d38173f0230e48672ea95df39eafd244b74c79b8b213d4d05cff8ea78c05e0b80ffff2032b4de587682a1be5025ff0559e8

                                                                • C:\Users\Admin\AppData\Local\Temp\4F3F.tmp\4F40.vbs

                                                                  Filesize

                                                                  1007B

                                                                  MD5

                                                                  5706bc5d518069a3b2be5e6fac51b12f

                                                                  SHA1

                                                                  d7361f3623ecf05e63bb97cc9da8d5c50401575c

                                                                  SHA256

                                                                  8a74eead47657582c84209eb4cdba545404d9c67dd288c605515a86e06de0aad

                                                                  SHA512

                                                                  fb68727db0365ab10c5b0d5e5e1d44b95aa38806e33b0af3280abcefae83f30eb8252653e158ac941320f3b38507649cce41898c8511223ee8642339cfece047

                                                                • C:\Users\Admin\AppData\Local\Temp\4F3F.tmp\mrsmajor\CPUUsage.vbs

                                                                  Filesize

                                                                  92B

                                                                  MD5

                                                                  0e4c01bf30b13c953f8f76db4a7e857d

                                                                  SHA1

                                                                  b8ddbc05adcf890b55d82a9f00922376c1a22696

                                                                  SHA256

                                                                  28e69e90466034ce392e84db2bde3ad43ad556d12609e3860f92016641b2a738

                                                                  SHA512

                                                                  5e66e2793e7bc88066b8df3dccb554351287dea18207e280b69d7798ecd5cdc99bd4c126c3e394db9f45f54bb561e6688f928de4f638c5eca4f101dc2cea54a1

                                                                • C:\Users\Admin\AppData\Local\Temp\4F3F.tmp\mrsmajor\DreS_X.bat

                                                                  Filesize

                                                                  360B

                                                                  MD5

                                                                  ba81d7fa0662e8ee3780c5becc355a14

                                                                  SHA1

                                                                  0bd3d86116f431a43d02894337af084caf2b4de1

                                                                  SHA256

                                                                  2590879a8cd745dbbe7ad66a548f31375ccfb0f8090d56b5e4bd5909573ac816

                                                                  SHA512

                                                                  0b768995187f988dc15d055f9689cee3ab3908d10b05a625b40d9757c101e067bbd6067ccbcf1951ebb683f5259eec562802ea6161d59475ce86cf6bc7c957f2

                                                                • C:\Users\Admin\AppData\Local\Temp\4F3F.tmp\mrsmajor\Icon_resource\SkullIco.ico

                                                                  Filesize

                                                                  244KB

                                                                  MD5

                                                                  c7bf05d7cb3535f7485606cf5b5987fe

                                                                  SHA1

                                                                  9d480d6f1e3f17d5018c1d2f4ae257ae983f0bb5

                                                                  SHA256

                                                                  4c1cfbe274f993941ac5fa512c376b6d7344800fb8be08cc6344e6c16a418311

                                                                  SHA512

                                                                  d30952a75d94dd64b7bd253ed72810690f3550f2262cfaaef45854fc8334f6201a8cbafb9b175c6435f7ce0499567f2fa8667b4b0046bfb651bf61eb4278e6c8

                                                                • C:\Users\Admin\AppData\Local\Temp\4F3F.tmp\mrsmajor\Launcher.vbs

                                                                  Filesize

                                                                  590B

                                                                  MD5

                                                                  b5a1c9ae4c2ae863ac3f6a019f556a22

                                                                  SHA1

                                                                  9ae506e04b4b7394796d5c5640b8ba9eba71a4a6

                                                                  SHA256

                                                                  6f0bb8cc239af15c9215867d6225c8ff344052aaa0deeb3452dbf463b8c46529

                                                                  SHA512

                                                                  a644c48562e38190720fb55a6c6e7d5ccfab60f362236fe7d63caebdc01758f17196d123fb37bd11f7e247ce8ab21812165b27496d3bd6ca5e2c5efefab8fb03

                                                                • C:\Users\Admin\AppData\Local\Temp\4F3F.tmp\mrsmajor\MrsMjrGui.exe

                                                                  Filesize

                                                                  71KB

                                                                  MD5

                                                                  450f49426b4519ecaac8cd04814c03a4

                                                                  SHA1

                                                                  063ee81f46d56544a5c217ffab69ee949eaa6f45

                                                                  SHA256

                                                                  087fca40e079746b9c1dfaf777d3994c0321ea8f69d08238cdfc02fb109add1d

                                                                  SHA512

                                                                  0cae15d863120f4edc6b6dabfe2f0f3d2e028057025d7d5ffe615cde8144f29bdaf099850e91e101e95d13f8a83cb1410a06172dda25a5f92967abcbc8453cbc

                                                                • C:\Users\Admin\AppData\Local\Temp\4F3F.tmp\mrsmajor\MrsMjrGuiLauncher.bat

                                                                  Filesize

                                                                  98B

                                                                  MD5

                                                                  c7146f88f4184c6ee5dcf7a62846aa23

                                                                  SHA1

                                                                  215adb85d81cc4130154e73a2ab76c6e0f6f2ff3

                                                                  SHA256

                                                                  47e6c9f62ffc41fbc555f8644ad099a96573c8c023797127f78b1a952ca1b963

                                                                  SHA512

                                                                  3b30fa1334b88af3e3382813d316104e3698173bb159c20ff3468cf3494ecfbbc32a9ae78b4919ecd47c05d506435af4a7ccee0576c0d0018a81fbd1b2dfcf10

                                                                • C:\Users\Admin\AppData\Local\Temp\4F3F.tmp\mrsmajor\WinLogon.bat

                                                                  Filesize

                                                                  117B

                                                                  MD5

                                                                  870bce376c1b71365390a9e9aefb9a33

                                                                  SHA1

                                                                  176fdbdb8e5795fb5fddc81b2b4e1d9677779786

                                                                  SHA256

                                                                  2798dad008f62aace1841edfb43146147a9cade388c419c96da788fcaa2f76bc

                                                                  SHA512

                                                                  f17c9898f81387daf42c9b858f507889919474ac2a17f96fc6d4606be94327e0b941b23a3ccc3f4af92b8abc0522e94745616da0564cdef1c3f20ee17ee31f53

                                                                • C:\Users\Admin\AppData\Local\Temp\4F3F.tmp\mrsmajor\def_resource\@Tile@@.jpg

                                                                  Filesize

                                                                  7KB

                                                                  MD5

                                                                  3e21bcf0d1e7f39d8b8ec2c940489ca2

                                                                  SHA1

                                                                  fa6879a984d70241557bb0abb849f175ace2fd78

                                                                  SHA256

                                                                  064f135fcc026a574552f42901b51052345f4b0f122edd7acd5f2dcc023160a5

                                                                  SHA512

                                                                  5577e20f76d6b1cccc513392532a09bdc6dcd3a8a177b8035dc5d7eb082e0093436068f92059e301c5987e6122c4d9aff3e5ae9cc94ccc1ecc9951e2785b0922

                                                                • C:\Users\Admin\AppData\Local\Temp\4F3F.tmp\mrsmajor\def_resource\Skullcur.cur

                                                                  Filesize

                                                                  3KB

                                                                  MD5

                                                                  cea57c3a54a04118f1db9db8b38ea17a

                                                                  SHA1

                                                                  112d0f8913ff205776b975f54639c5c34ce43987

                                                                  SHA256

                                                                  d2b6db8b28112da51e34972dec513278a56783d24b8b5408f11997e9e67d422b

                                                                  SHA512

                                                                  561860907fa2f53c7853094299758232a70c0cd22c6df3534abd094c6970f28792c6c334a33b129d661a46930d90fd8c98f11cb34f3e277cf20a355b792f64f0

                                                                • C:\Users\Admin\AppData\Local\Temp\4F3F.tmp\mrsmajor\def_resource\creepysound.mp3

                                                                  Filesize

                                                                  1.2MB

                                                                  MD5

                                                                  4a9b1d8a8fe8a75c81ddba3e411ddc5d

                                                                  SHA1

                                                                  e40cb1ee4490f6d7520902e12222446a8efbf9a8

                                                                  SHA256

                                                                  79e9a3611494b5ffafaa79788ba7e11dd218e3800c40b56684ccc0c33ab64eac

                                                                  SHA512

                                                                  e7a28acb04ca33d57efe0474bb67d6d4b8ceff9198198b81574c76c835d5df05d113fc468f4a4434580b1b58189f38184c376976604dc05d1424af1721995601

                                                                • C:\Users\Admin\AppData\Local\Temp\4F3F.tmp\mrsmajor\def_resource\f11.mp4

                                                                  Filesize

                                                                  227KB

                                                                  MD5

                                                                  17042b9e5fc04a571311cd484f17b9eb

                                                                  SHA1

                                                                  585d91c69c3f9e3d2e8cb8cf984871d89cc4adbb

                                                                  SHA256

                                                                  a9b0f1f849e0b41924f5e80b0c4948e63fc4b4f335bbdf0f997b03a3aff55424

                                                                  SHA512

                                                                  709076c6cef8dd61701c93e1fe331d2b1a218498b833db10ee4d2be0816e3444aeebfa092ab1bd10322617cf3385414e8fdb76fd90f25b44ac24d38937b4d47f

                                                                • C:\Users\Admin\AppData\Local\Temp\4F3F.tmp\mrsmajor\default.txt

                                                                  Filesize

                                                                  266B

                                                                  MD5

                                                                  30cfd8bb946a7e889090fb148ea6f501

                                                                  SHA1

                                                                  c49dbc93f0f17ff65faf3b313562c655ef3f9753

                                                                  SHA256

                                                                  e1ebbd3abfcaddf7d6960708f3ccd8eda64c944723f0905ff76551c692b94210

                                                                  SHA512

                                                                  8e7d98e6d0c05d199114d2d6ab8da886aed68de690c4d79643868eaf051c229fff94c88d937adb3da5e31fe48116613cf79dd00dda30f296746ce0a8aded9fe2

                                                                • C:\Users\Admin\AppData\Local\Temp\4F3F.tmp\mrsmajor\mrsmajorlauncher.vbs

                                                                  Filesize

                                                                  3KB

                                                                  MD5

                                                                  e3fdf285b14fb588f674ebfc2134200c

                                                                  SHA1

                                                                  30fba2298b6e1fade4b5f9c8c80f7f1ea07de811

                                                                  SHA256

                                                                  4d3aa3ecd16a6ba46a9d6c0bdacdcd9dce70d93585941a94e544696e3e6f7d92

                                                                  SHA512

                                                                  9b0bfbb07c77d9e9979a6c0f88b0a93010133f7dd3cf01e1de5dfbe812a5ed920e916d16d6a32fe21b9ee4b5425e61a616ded1aeeb35a410d4f77c0f9392ed0a

                                                                • C:\Users\Admin\AppData\Local\Temp\4F3F.tmp\mrsmajor\reStart.vbs

                                                                  Filesize

                                                                  638B

                                                                  MD5

                                                                  0851e8d791f618daa5b72d40e0c8e32b

                                                                  SHA1

                                                                  80bea0443dc4cc508e846fefdb9de6c44ad8ff91

                                                                  SHA256

                                                                  2cbd8bc239c5cfc3ef02f8472d867dff61e5aed9fde8a3823cda28cc37d77722

                                                                  SHA512

                                                                  57a9d1d75dbbab842060b29f01958f7e6b27d0175ff9a3f7b97e423c1b4e3fae94547a569c2e5c88224fc5dcc785f5a1d49c61199a8c7b3afeb4fc520600df40

                                                                • C:\Users\Admin\AppData\Local\Temp\5a530dfd-bc51-4992-a05d-f09d41a331d4\AgileDotNetRT64.dll

                                                                  Filesize

                                                                  75KB

                                                                  MD5

                                                                  42b2c266e49a3acd346b91e3b0e638c0

                                                                  SHA1

                                                                  2bc52134f03fcc51cb4e0f6c7cf70646b4df7dd1

                                                                  SHA256

                                                                  adeed015f06efa363d504a18acb671b1db4b20b23664a55c9bc28aef3283ca29

                                                                  SHA512

                                                                  770822fd681a1d98afe03f6fbe5f116321b54c8e2989fb07491811fd29fca5b666f1adf4c6900823af1271e342cacc9293e9db307c4eef852d1a253b00347a81

                                                                • C:\Users\Admin\AppData\Local\Temp\8482.tmp\8483.tmp\8493.vbs

                                                                  Filesize

                                                                  352B

                                                                  MD5

                                                                  3b8696ecbb737aad2a763c4eaf62c247

                                                                  SHA1

                                                                  4a2d7a2d61d3f4c414b4e5d2933cd404b8f126e5

                                                                  SHA256

                                                                  ce95f7eea8b303bc23cfd6e41748ad4e7b5e0f0f1d3bdf390eadb1e354915569

                                                                  SHA512

                                                                  713d9697b892b9dd892537e8a01eab8d0265ebf64867c8beecf7a744321257c2a5c11d4de18fcb486bb69f199422ce3cab8b6afdbe880481c47b06ba8f335beb

                                                                • C:\Users\Admin\AppData\Local\Temp\8482.tmp\eulascr.exe

                                                                  Filesize

                                                                  143KB

                                                                  MD5

                                                                  8b1c352450e480d9320fce5e6f2c8713

                                                                  SHA1

                                                                  d6bd88bf33de7c5d4e68b233c37cc1540c97bd3a

                                                                  SHA256

                                                                  2c343174231b55e463ca044d19d47bd5842793c15954583eb340bfd95628516e

                                                                  SHA512

                                                                  2d8e43b1021da08ed1bf5aff110159e6bc10478102c024371302ccfce595e77fd76794658617b5b52f9a50190db250c1ba486d247d9cd69e4732a768edbb4cbc

                                                                • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

                                                                  Filesize

                                                                  1KB

                                                                  MD5

                                                                  37cc1983debf65e601f39f08d51a1159

                                                                  SHA1

                                                                  0de2363a3d213ef0bd56abd07dea1890c01f97eb

                                                                  SHA256

                                                                  eb6802c85b26a6599d4a7db1b64b9471268178b28f446429439e189ea0e1ca54

                                                                  SHA512

                                                                  1444ed3ba5e53b71f3620439e1a941196fc1824d91e16d99cc32cca72cb37cd723c22cb505e1acd39eaa63faea8afe1a53355558bf081b66ff9dafcba853f692

                                                                • C:\Users\Admin\Desktop\MRS MAJOR WANTS TO MEET YOU 5.txt

                                                                  Filesize

                                                                  27B

                                                                  MD5

                                                                  e20f623b1d5a781f86b51347260d68a5

                                                                  SHA1

                                                                  7e06a43ba81d27b017eb1d5dcc62124a9579f96e

                                                                  SHA256

                                                                  afeebe824fc4a955a673d3d8569a0b49dfbc43c6cc1d4e3d66d9855c28a7a179

                                                                  SHA512

                                                                  2e74cccdd158ce1ffde84573d43e44ec6e488d00282a661700906ba1966ad90968a16c405a9640b9d33db03b33753733c9b7078844b0f6ac3af3de0c3c044c0b

                                                                • C:\Users\Admin\Downloads\BossDaMajor.exe

                                                                  Filesize

                                                                  1.9MB

                                                                  MD5

                                                                  38ff71c1dee2a9add67f1edb1a30ff8c

                                                                  SHA1

                                                                  10f0defd98d4e5096fbeb321b28d6559e44d66db

                                                                  SHA256

                                                                  730a41a7656f606a22e9f0d68782612d6e00ab8cfe1260160b9e0b00bc2e442a

                                                                  SHA512

                                                                  8347782951f2647fe433482cb13186653afa32ee9f5be83a138c4ed47ff34d8de66a26e74b5a28ea21c1529b2078401922a9a26803772677b70489967c10f3e9

                                                                • C:\Users\Admin\Downloads\MrsMajor2.0.7z.crdownload

                                                                  Filesize

                                                                  22.4MB

                                                                  MD5

                                                                  81041a562190fe49c0fac248638b2d04

                                                                  SHA1

                                                                  755d8426f18e3f0ad8e28d4655468d8cfdac67bf

                                                                  SHA256

                                                                  0d64e4fe519291c901b67944d9215f6254552c7ea5d12cc4fc930ab58c7ca268

                                                                  SHA512

                                                                  e482702b08e401de88c67a703cb1612831f0cbc9365eb2e634602712bed6ad6cfae30dd820d96001c49100420bc457af083e7c09d79d825e87fe231cc0646eb2

                                                                • C:\Users\Admin\Downloads\MrsMajor3.0.exe.crdownload

                                                                  Filesize

                                                                  381KB

                                                                  MD5

                                                                  35a27d088cd5be278629fae37d464182

                                                                  SHA1

                                                                  d5a291fadead1f2a0cf35082012fe6f4bf22a3ab

                                                                  SHA256

                                                                  4a75f2db1dbd3c1218bb9994b7e1c690c4edd4e0c1a675de8d2a127611173e69

                                                                  SHA512

                                                                  eb0be3026321864bd5bcf53b88dc951711d8c0b4bcbd46800b90ca5116a56dba22452530e29f3ccbbcc43d943bdefc8ed8ca2d31ba2e7e5f0e594f74adba4ab5

                                                                • memory/3436-460-0x000000001DD50000-0x000000001DF12000-memory.dmp

                                                                  Filesize

                                                                  1.8MB

                                                                • memory/3436-459-0x00007FFB82500000-0x00007FFB8264F000-memory.dmp

                                                                  Filesize

                                                                  1.3MB

                                                                • memory/3436-461-0x000000001E450000-0x000000001E978000-memory.dmp

                                                                  Filesize

                                                                  5.2MB

                                                                • memory/3436-452-0x00000000003A0000-0x00000000003CA000-memory.dmp

                                                                  Filesize

                                                                  168KB

                                                                • memory/4964-918-0x0000000006F60000-0x0000000006F70000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-964-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-917-0x0000000006F60000-0x0000000006F70000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-913-0x0000000006F60000-0x0000000006F70000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-914-0x0000000006F60000-0x0000000006F70000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-938-0x00000000052C0000-0x00000000052D0000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-915-0x0000000006F60000-0x0000000006F70000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-941-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-942-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-943-0x00000000070F0000-0x0000000007100000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-944-0x00000000070F0000-0x0000000007100000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-946-0x00000000070F0000-0x0000000007100000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-945-0x00000000070F0000-0x0000000007100000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-948-0x00000000070F0000-0x0000000007100000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-947-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-949-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-951-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-950-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-952-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-953-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-955-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-956-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-957-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-958-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-960-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-959-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-962-0x00000000070F0000-0x0000000007100000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-963-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-967-0x00000000052C0000-0x00000000052D0000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-966-0x00000000070F0000-0x0000000007100000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-965-0x00000000070F0000-0x0000000007100000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-916-0x00000000078A0000-0x00000000078B0000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-971-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-972-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-973-0x00000000070F0000-0x0000000007100000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-974-0x00000000070F0000-0x0000000007100000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-976-0x00000000070F0000-0x0000000007100000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-975-0x00000000070F0000-0x0000000007100000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-981-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-980-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-979-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-978-0x00000000070F0000-0x0000000007100000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-977-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-984-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-986-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-987-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-988-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-989-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-985-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-991-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-992-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-993-0x00000000070F0000-0x0000000007100000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-994-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-995-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-997-0x00000000070F0000-0x0000000007100000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-998-0x00000000070F0000-0x0000000007100000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-999-0x00000000052C0000-0x00000000052D0000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-1001-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-1003-0x00000000070F0000-0x0000000007100000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-1002-0x00000000052F0000-0x0000000005300000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-1005-0x00000000070F0000-0x0000000007100000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-1004-0x00000000070F0000-0x0000000007100000-memory.dmp

                                                                  Filesize

                                                                  64KB

                                                                • memory/4964-912-0x0000000006F60000-0x0000000006F70000-memory.dmp

                                                                  Filesize

                                                                  64KB