Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

18/03/2025, 19:38

250318-ycrjca1kz6 6

18/03/2025, 19:35

250318-ya273a1kx9 9

18/03/2025, 19:32

250318-x86gpsw1hs 6

18/03/2025, 19:31

250318-x8flaaw1gs 3

18/03/2025, 19:29

250318-x7f6es1kt5 10

18/03/2025, 19:25

250318-x5evks1j19 10

18/03/2025, 19:16

250318-xyyn4swzdx 8

18/03/2025, 19:13

250318-xw6a6swzb1 10

18/03/2025, 19:04

250318-xreyeswyfv 8

18/03/2025, 19:00

250318-xntmeawycw 10

Analysis

  • max time kernel
    130s
  • max time network
    134s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250314-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    18/03/2025, 19:16

Errors

Reason
Machine shutdown

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Trojan/MrsMajors/MrsMajor3.0.exe

Malware Config

Signatures

  • Disables Task Manager via registry modification
  • Downloads MZ/PE file 5 IoCs
  • Executes dropped EXE 5 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 6 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Windows directory 13 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 4 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies data under HKEY_USERS 17 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://github.com/Da2dalus/The-MALWARE-Repo/blob/master/Trojan/MrsMajors/MrsMajor3.0.exe
    1⤵
    • Drops file in Windows directory
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x264,0x268,0x26c,0x260,0x28c,0x7ff9dfe8f208,0x7ff9dfe8f214,0x7ff9dfe8f220
      2⤵
        PID:2180
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1816,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=2332 /prefetch:3
        2⤵
        • Downloads MZ/PE file
        PID:928
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2304,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=2300 /prefetch:2
        2⤵
          PID:4916
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2612,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=2644 /prefetch:8
          2⤵
            PID:4620
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3344,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=3476 /prefetch:1
            2⤵
              PID:716
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3464,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=3504 /prefetch:1
              2⤵
                PID:3284
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4220,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=4276 /prefetch:1
                2⤵
                  PID:1444
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4248,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=4280 /prefetch:2
                  2⤵
                    PID:192
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3564,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=3596 /prefetch:8
                    2⤵
                      PID:3776
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3520,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=5272 /prefetch:8
                      2⤵
                        PID:3540
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5272,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=3476 /prefetch:8
                        2⤵
                          PID:1988
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5440,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=5392 /prefetch:8
                          2⤵
                            PID:1608
                          • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5900,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=5928 /prefetch:8
                            2⤵
                              PID:3944
                            • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5900,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=5928 /prefetch:8
                              2⤵
                                PID:1596
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6148,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6120 /prefetch:8
                                2⤵
                                  PID:3524
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6288,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6304 /prefetch:8
                                  2⤵
                                    PID:4788
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6108,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=5108 /prefetch:8
                                    2⤵
                                      PID:4520
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5772,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6376 /prefetch:8
                                      2⤵
                                        PID:984
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6584,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6364 /prefetch:8
                                        2⤵
                                          PID:1640
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6748,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6768 /prefetch:8
                                          2⤵
                                            PID:3560
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6364,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6936 /prefetch:8
                                            2⤵
                                              PID:2548
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6968,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6976 /prefetch:8
                                              2⤵
                                                PID:2868
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4532,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=4576 /prefetch:8
                                                2⤵
                                                  PID:2672
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4272,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=4564 /prefetch:8
                                                  2⤵
                                                    PID:4580
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4604,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=7056 /prefetch:8
                                                    2⤵
                                                      PID:2236
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=en-US --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5348,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=5308 /prefetch:8
                                                      2⤵
                                                        PID:3560
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --always-read-main-dll --field-trial-handle=4284,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6624 /prefetch:1
                                                        2⤵
                                                          PID:4140
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=3636,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6836 /prefetch:8
                                                          2⤵
                                                            PID:1112
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7012,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6896 /prefetch:8
                                                            2⤵
                                                              PID:2744
                                                            • C:\Users\Admin\Downloads\Gas.exe
                                                              "C:\Users\Admin\Downloads\Gas.exe"
                                                              2⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              PID:5080
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7148,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=3416 /prefetch:8
                                                              2⤵
                                                                PID:2660
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --always-read-main-dll --field-trial-handle=1976,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6016 /prefetch:1
                                                                2⤵
                                                                  PID:2140
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6204,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6196 /prefetch:8
                                                                  2⤵
                                                                    PID:2020
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6372,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6180 /prefetch:8
                                                                    2⤵
                                                                      PID:4804
                                                                    • C:\Users\Admin\Downloads\LoveYou.exe
                                                                      "C:\Users\Admin\Downloads\LoveYou.exe"
                                                                      2⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:2344
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6740,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6168 /prefetch:8
                                                                      2⤵
                                                                        PID:5080
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --always-read-main-dll --field-trial-handle=6820,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=4240 /prefetch:1
                                                                        2⤵
                                                                          PID:1096
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6872,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6756 /prefetch:8
                                                                          2⤵
                                                                            PID:4644
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6852,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6772 /prefetch:8
                                                                            2⤵
                                                                              PID:4912
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6024,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6684 /prefetch:8
                                                                              2⤵
                                                                                PID:3564
                                                                              • C:\Users\Admin\Downloads\PCToaster.exe
                                                                                "C:\Users\Admin\Downloads\PCToaster.exe"
                                                                                2⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                PID:60
                                                                                • C:\Program Files\Java\jre-1.8\bin\javaw.exe
                                                                                  "C:\Program Files\Java\jre-1.8\bin\javaw.exe" -jar "C:\Users\Admin\Downloads\PCToaster.exe"
                                                                                  3⤵
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:1848
                                                                                  • C:\Windows\SYSTEM32\attrib.exe
                                                                                    attrib +h C:\Users\Admin\Downloads\scr.txt
                                                                                    4⤵
                                                                                    • Views/modifies file attributes
                                                                                    PID:4824
                                                                                  • C:\Windows\SYSTEM32\diskpart.exe
                                                                                    diskpart /s C:\Users\Admin\Downloads\scr.txt
                                                                                    4⤵
                                                                                      PID:552
                                                                                    • C:\Windows\SYSTEM32\takeown.exe
                                                                                      takeown /f V:\Boot /r
                                                                                      4⤵
                                                                                      • Modifies file permissions
                                                                                      • Enumerates connected drives
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      PID:2056
                                                                                    • C:\Windows\SYSTEM32\takeown.exe
                                                                                      takeown /f V:\Recovery /r
                                                                                      4⤵
                                                                                      • Modifies file permissions
                                                                                      • Enumerates connected drives
                                                                                      PID:2708
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6628,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6952 /prefetch:8
                                                                                  2⤵
                                                                                    PID:116
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=39 --always-read-main-dll --field-trial-handle=7080,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6728 /prefetch:1
                                                                                    2⤵
                                                                                      PID:3312
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7236,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6120 /prefetch:8
                                                                                      2⤵
                                                                                        PID:1964
                                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7088,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6780 /prefetch:8
                                                                                        2⤵
                                                                                          PID:3404
                                                                                        • C:\Users\Admin\Downloads\Alerta.exe
                                                                                          "C:\Users\Admin\Downloads\Alerta.exe"
                                                                                          2⤵
                                                                                          • Executes dropped EXE
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:2364
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=788,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=4236 /prefetch:8
                                                                                          2⤵
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          PID:1712
                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4396,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=5460 /prefetch:8
                                                                                          2⤵
                                                                                            PID:1332
                                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --always-read-main-dll --field-trial-handle=5308,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=6936 /prefetch:1
                                                                                            2⤵
                                                                                              PID:1220
                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6176,i,12452323164968911214,6299462754391647108,262144 --variations-seed-version --mojo-platform-channel-handle=5180 /prefetch:8
                                                                                              2⤵
                                                                                                PID:2796
                                                                                              • C:\Users\Admin\Downloads\000.exe
                                                                                                "C:\Users\Admin\Downloads\000.exe"
                                                                                                2⤵
                                                                                                • Executes dropped EXE
                                                                                                • Enumerates connected drives
                                                                                                • Modifies WinLogon
                                                                                                • Sets desktop wallpaper using registry
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Modifies registry class
                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:4852
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\windl.bat""
                                                                                                  3⤵
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  PID:3320
                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                    taskkill /f /im explorer.exe
                                                                                                    4⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:380
                                                                                                  • C:\Windows\SysWOW64\taskkill.exe
                                                                                                    taskkill /f /im taskmgr.exe
                                                                                                    4⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Kills process with taskkill
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:1612
                                                                                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                    wmic useraccount where name='Admin' set FullName='UR NEXT'
                                                                                                    4⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:3972
                                                                                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                    wmic useraccount where name='Admin' rename 'UR NEXT'
                                                                                                    4⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:4432
                                                                                                  • C:\Windows\SysWOW64\shutdown.exe
                                                                                                    shutdown /f /r /t 0
                                                                                                    4⤵
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:1896
                                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                              1⤵
                                                                                                PID:1476
                                                                                              • C:\Windows\System32\vdsldr.exe
                                                                                                C:\Windows\System32\vdsldr.exe -Embedding
                                                                                                1⤵
                                                                                                  PID:2128
                                                                                                • C:\Windows\System32\vds.exe
                                                                                                  C:\Windows\System32\vds.exe
                                                                                                  1⤵
                                                                                                  • Checks SCSI registry key(s)
                                                                                                  PID:3204
                                                                                                • C:\Windows\system32\LogonUI.exe
                                                                                                  "LogonUI.exe" /flags:0x4 /state0:0xa39de855 /state1:0x41c64e6d
                                                                                                  1⤵
                                                                                                  • Modifies data under HKEY_USERS
                                                                                                  PID:3040

                                                                                                Network

                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                Replay Monitor

                                                                                                Loading Replay Monitor...

                                                                                                Downloads

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                  Filesize

                                                                                                  280B

                                                                                                  MD5

                                                                                                  a46a324553367dc0b13a007305e4f102

                                                                                                  SHA1

                                                                                                  005a700ac0bf4429024f9e857e2281f82f370aed

                                                                                                  SHA256

                                                                                                  a718f2fe90be4422382450b4959840a13d6d18dea09d3da5394624198a126063

                                                                                                  SHA512

                                                                                                  d3b9fcde15be13451aa441070d9143fc53faa6a2725adea7fb9c340bcb9d7ea183dc1b36c0f8ec21c1748c80bc8fa03a14f198c2fc914c9f8e81702bd8e18399

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                  Filesize

                                                                                                  280B

                                                                                                  MD5

                                                                                                  29f13140c50c2394177caf96baf3a5c0

                                                                                                  SHA1

                                                                                                  680e35060382a846752eb208b62de077d31fd1eb

                                                                                                  SHA256

                                                                                                  f4554eb3e1e133edb5f5f01e19539ffc52adc0b346e19c4742a815e7a92b2dcb

                                                                                                  SHA512

                                                                                                  d964d066a2913d3b6eb73925160d7e9d79a94ae5c6e3956cd361b54fe53833b311990a91346917bc90b227301d864939f6a5a417ff52ef9fe8e21971b1a661fc

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                  Filesize

                                                                                                  5KB

                                                                                                  MD5

                                                                                                  0096554a2334e66ee6923c94b83183ef

                                                                                                  SHA1

                                                                                                  d8e924348c9b40e77b0d52148e1c0aa90de11c68

                                                                                                  SHA256

                                                                                                  be4810311402f65c0c0dbda33f8c8f6b7757df9e47ca908eb8dedbb041a226cb

                                                                                                  SHA512

                                                                                                  0c104d4b344a2c86d71cc5c003104e7fee2cfdd2c820b86948fd39572267a69bea3df1af1b9e2cfa124f0eb2ae0fc7c447e266b7412d6c4429482027bd7c4744

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index~RFe5801ff.TMP

                                                                                                  Filesize

                                                                                                  3KB

                                                                                                  MD5

                                                                                                  c5c4d2696aaed1cbcadfd0bb98c3348b

                                                                                                  SHA1

                                                                                                  b2b8cd38b13f057a90b80650fa238a947c2b2286

                                                                                                  SHA256

                                                                                                  7fcf29348a78ba7d3f933d7e8c40fab58f5dd6c36a61094d518303ee5d55e2b7

                                                                                                  SHA512

                                                                                                  6f389cb3d377a4a46083e9bdaf7647ec18efb2a9b9a8f2de9a7627ca549c5f556d213622462d7c0cba5efd1f1b2f65162c2e640c15e58ab344a5b701ffdeb843

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\SiteList-Enterprise.json

                                                                                                  Filesize

                                                                                                  2B

                                                                                                  MD5

                                                                                                  99914b932bd37a50b983c5e7c90ae93b

                                                                                                  SHA1

                                                                                                  bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                                                                  SHA256

                                                                                                  44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                                                                  SHA512

                                                                                                  27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                                                                                  Filesize

                                                                                                  69KB

                                                                                                  MD5

                                                                                                  164a788f50529fc93a6077e50675c617

                                                                                                  SHA1

                                                                                                  c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48

                                                                                                  SHA256

                                                                                                  b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17

                                                                                                  SHA512

                                                                                                  ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_0\content.js

                                                                                                  Filesize

                                                                                                  9KB

                                                                                                  MD5

                                                                                                  3d20584f7f6c8eac79e17cca4207fb79

                                                                                                  SHA1

                                                                                                  3c16dcc27ae52431c8cdd92fbaab0341524d3092

                                                                                                  SHA256

                                                                                                  0d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643

                                                                                                  SHA512

                                                                                                  315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\HubApps

                                                                                                  Filesize

                                                                                                  107KB

                                                                                                  MD5

                                                                                                  40e2018187b61af5be8caf035fb72882

                                                                                                  SHA1

                                                                                                  72a0b7bcb454b6b727bf90da35879b3e9a70621e

                                                                                                  SHA256

                                                                                                  b3efd9d75856016510dd0bdb5e22359925cee7f2056b3cde6411c55ae8ae8ee5

                                                                                                  SHA512

                                                                                                  a21b8f3f7d646909d6aed605ad5823269f52fda1255aa9bb4d4643e165a7b11935572bf9e0a6a324874f99c20a6f3b6d1e457c7ccd30adcac83c15febc063d12

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                                                  Filesize

                                                                                                  3KB

                                                                                                  MD5

                                                                                                  6f56666c1f0a3aec147ea18728956777

                                                                                                  SHA1

                                                                                                  310491fa677fbb3213bd21d82eb051754e22f28f

                                                                                                  SHA256

                                                                                                  2619b6074faff32746c9768d90616f60dbd044c0deaf80925982e9c181c1d4ea

                                                                                                  SHA512

                                                                                                  f5436f46e9cb0a706d415fbededc219e7f408aa697cdbfa6e81895e5108eb3cb1d9b8e0092380f95fc152cd4664fda0719c4ae78cc3955d4f1e80281dd1aa7d0

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                                                  Filesize

                                                                                                  111B

                                                                                                  MD5

                                                                                                  285252a2f6327d41eab203dc2f402c67

                                                                                                  SHA1

                                                                                                  acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                                                                  SHA256

                                                                                                  5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                                                                  SHA512

                                                                                                  11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                  Filesize

                                                                                                  2B

                                                                                                  MD5

                                                                                                  d751713988987e9331980363e24189ce

                                                                                                  SHA1

                                                                                                  97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                  SHA256

                                                                                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                  SHA512

                                                                                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                  Filesize

                                                                                                  15KB

                                                                                                  MD5

                                                                                                  40542a60584cb071dcfa17843b742414

                                                                                                  SHA1

                                                                                                  b4563be01a27eee3ef1677956310a93c28de57b6

                                                                                                  SHA256

                                                                                                  d59924cc7ba931981e7a973c08f82cc5d2e6be6754538d3dbab54f760e9254b4

                                                                                                  SHA512

                                                                                                  389aafa523099e28e066e635a4325e5cfd5e9edde0586c944a725e031e681ecd095ebe2ea74d5501e25cbe86e9aa34ca590b180120d671af853b16e6a8f7b3ea

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                  Filesize

                                                                                                  15KB

                                                                                                  MD5

                                                                                                  6dbaa9465e2c8a0ad4cb47629a92ff8b

                                                                                                  SHA1

                                                                                                  38520893ef40c135a181925a904e628d0fa665f7

                                                                                                  SHA256

                                                                                                  d0f4cfd89d3d41bf5e956cc1e4c5d8c122fe800683773665d29afc6dce74cea1

                                                                                                  SHA512

                                                                                                  b52dd95b012158ca6e319d6e57e223aa45db1c7ef6afc8683ac033554c8b3453a6969dac17fbc97ce3f2b5414828ec5baa46c73b3e1981b1aea4cd0e9b2189ff

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                  Filesize

                                                                                                  14KB

                                                                                                  MD5

                                                                                                  dfa6f6bc75bd426a5d4a99a8756f44dc

                                                                                                  SHA1

                                                                                                  83cdc175eccf2252f72e9b82dce20f652abbfa81

                                                                                                  SHA256

                                                                                                  b5ab0e539220dbfba59bfd1d4732132e8eb689f9199f43fdab4fc1575151af8e

                                                                                                  SHA512

                                                                                                  e2045c26118843e7228645e381851854e729d9734f77e0910f0a557b56dff38d4a4150fc0d065a3bbae78387e99f5e1bbc4b5d8ef9b56f1636238919d3f86954

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                                  Filesize

                                                                                                  36KB

                                                                                                  MD5

                                                                                                  72404852a6b42e6504ba355b3e534187

                                                                                                  SHA1

                                                                                                  af7158d6ae28fb3a910ead547bd948728a463908

                                                                                                  SHA256

                                                                                                  b7158010944d793c5c3c49cf6ea7cdfa42993bcfa86456c6daebc21efbbb77e9

                                                                                                  SHA512

                                                                                                  0a4be296b38c39050941e79b486f588dbabcd01250b5ba171bfd2915151c3dee14531ddd8e7e5bb56bbfd74e92b511ee80e640f1dbbf5d2874324a9fe6dddf1d

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\Logs\sync_diagnostic.log

                                                                                                  Filesize

                                                                                                  4KB

                                                                                                  MD5

                                                                                                  5336694faf47c19467cc25cdfd0b7163

                                                                                                  SHA1

                                                                                                  8b9a439929b9d6c643cc94e80025f3922a46155d

                                                                                                  SHA256

                                                                                                  fd4dfd3d79b71495b904fe2feda28d161cba6c14524f64ad62304dc4fe9e2347

                                                                                                  SHA512

                                                                                                  5c6e98859fd31cab1e8d0c70bb94db840e928c4658e91f5a487d274606ebfcbe55740f7f423a8df7d62406810557c747c51485eb1620249facc76af273536516

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\5965d8e1-d0c2-4f5b-979b-b49281ba418d.tmp

                                                                                                  Filesize

                                                                                                  20KB

                                                                                                  MD5

                                                                                                  622cf13abe8c4ba81acbbe4070f8d70a

                                                                                                  SHA1

                                                                                                  29c39577de789602617632a1ee745e5897805fa7

                                                                                                  SHA256

                                                                                                  b91863cb7dfb695e04f8be6b437f67ba669d1cfbd407a3418cccf12919c7dab4

                                                                                                  SHA512

                                                                                                  25d382c5ef4691018d62f05e28a6d2c321218e1586646b2e628350968f2475d30a13c53c5055bea16451111b1c566e53003af3e2afe3a9e5a3785255069c23f8

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                                                  Filesize

                                                                                                  876B

                                                                                                  MD5

                                                                                                  2e1eeff320dc70ca1cb5a959a0e96c5c

                                                                                                  SHA1

                                                                                                  7f365196431b36a2eb69f571d8073760644019e8

                                                                                                  SHA256

                                                                                                  c31cb2265a758de1fce8b99f43b89de822bf4f53e5a0bbf50bcc19e326271289

                                                                                                  SHA512

                                                                                                  c722f2b688e3d63984ac3c3d2a32b3509612e02ad548f9c6be4a0c5b11be8d571d62276a71588a40c59d74e8b5afe44fd10d5978a76b74e3bd772aed635e0e6c

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                                                  Filesize

                                                                                                  21KB

                                                                                                  MD5

                                                                                                  dbd6681987bbadb6b5e30868473d029f

                                                                                                  SHA1

                                                                                                  ccb98314fcdf0e272d224141416c91cf0c20560e

                                                                                                  SHA256

                                                                                                  a0481a5758c0771359e6a31efc47a940d5b53d8f80bfc75f3aa9f701f8f1185c

                                                                                                  SHA512

                                                                                                  238da908b976cbbbf7be5fcfd0031ce528d55b8b13145265e79f3fa4130fb799d0f61aec621bee9687b9ced62d0d9f82598077a5bed58758b118d797dd98f116

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe589219.TMP

                                                                                                  Filesize

                                                                                                  469B

                                                                                                  MD5

                                                                                                  e5b6630af4092e5efac5ed468860964f

                                                                                                  SHA1

                                                                                                  8d7d61e4336e37ff95d0cd004bba44841111a3d5

                                                                                                  SHA256

                                                                                                  3c8ad52f42218e6d859549d4e43e08ef91d84783d8a5b870684274166b776b40

                                                                                                  SHA512

                                                                                                  ee4c69066b367935516b900ff693f6e9d4bddd837b02235ec23570173dfebf308fd1a4198da7ff440de24180b1a2d51a57a559b0873053f7bc2391b97a8c88df

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                  Filesize

                                                                                                  30KB

                                                                                                  MD5

                                                                                                  20700f22528d93ca3f7a56507d40927e

                                                                                                  SHA1

                                                                                                  3487c59fa5e741d5b88e7666328e88ad73c128ad

                                                                                                  SHA256

                                                                                                  3a79870dfd5ba56942e7b632f79a911fb734aeab5d2ceb3e7e0a17e530dcdced

                                                                                                  SHA512

                                                                                                  e0f2d979013067f54b5e8883a4a1b17d077bd88743f44cb1d61dcf9d88d8745de11939f95af5ba19c85938a9cdfa5eebddaefe2eb454b326f77922f4b8f22749

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                  Filesize

                                                                                                  7KB

                                                                                                  MD5

                                                                                                  b975d1e28146a034222089e727da2d3e

                                                                                                  SHA1

                                                                                                  f6a2f906c6a849975c40dbc1939e6e9d8f2ef7ed

                                                                                                  SHA256

                                                                                                  0b44646bac59f2f2d08e9ded45ff6a2d1caef13416f1f764de69023d4eb8c732

                                                                                                  SHA512

                                                                                                  68de577eee2b999aabe9fc7d083194ac817c41624caec89a4db9d0a7475f25cf071919ad43f7852e0ab7ff2a9a2f78ab5e8d950994e863a55fb32ae1ca61f16e

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                  Filesize

                                                                                                  39KB

                                                                                                  MD5

                                                                                                  1b92a6ed945147487a1a11a84c73d3a3

                                                                                                  SHA1

                                                                                                  47d2c38ec3d93419bf4581f6efd56378838d4052

                                                                                                  SHA256

                                                                                                  6c65c0e70353724f62ac20720b7b6643aa854ed617e4a0c821c00ec843b84dfe

                                                                                                  SHA512

                                                                                                  bbd871f082798612fe533d1c04d121642d38dcb9fc643afbb73636adf9cab38285c41d9260611a2800f5d76ab365a7a4f6c3333119a44fcb13b3727fe3f676c6

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                  Filesize

                                                                                                  6KB

                                                                                                  MD5

                                                                                                  e57e1d63737cd0d68ef7af14dcd4c65c

                                                                                                  SHA1

                                                                                                  e5cf4a523f80eb909f818724c34247cc47c25ca4

                                                                                                  SHA256

                                                                                                  6dd1055baae5e20b5197e8525d33ca5267b8a2fd41fc85edb0bace3e819908ff

                                                                                                  SHA512

                                                                                                  1d2c938bd63fdfa9ea245fc303e122c261b77a3b18c605facd9d447147853f846f44ae280306b732f318f7e53adee0f936699d581df255591bca3c248b348c9a

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                  Filesize

                                                                                                  39KB

                                                                                                  MD5

                                                                                                  04b8dac007c24457da98ce2fc0ec9fec

                                                                                                  SHA1

                                                                                                  6da5f6456c507ae34bb6bb7c030d4cbf616e95ed

                                                                                                  SHA256

                                                                                                  ddf193dd07c5fb19bfdf7c823f5e16c55ada6d23dd796d9bb44c408e91ffe533

                                                                                                  SHA512

                                                                                                  fa0f8cd24ea4b6466f08a1466eea809a432fd0a8b941c1214daa4bde29a1d1f5a4fd79b3599b03340daaf9f3377e180b34206681fd0e99fbee2812f751e9b0bf

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                  Filesize

                                                                                                  30KB

                                                                                                  MD5

                                                                                                  d5c4bfe0a40274ad38af9a79a41f56dc

                                                                                                  SHA1

                                                                                                  8b19384e7cc2198a835e9fb96df488befb32827b

                                                                                                  SHA256

                                                                                                  28acdd17fa7f3eee1404a29dd500cad2f4a6e6f1be13b397bca54efe2a1512bd

                                                                                                  SHA512

                                                                                                  d83db813310ce0b7a6854b68f0a2b61cc633fe1af2cf52de82e340e489c4053ee66ff10a3810c6284d807fb15c0f37245d1fa3efdd473e3235c0e2b540ee65aa

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\RevisitationBloomfilter

                                                                                                  Filesize

                                                                                                  392B

                                                                                                  MD5

                                                                                                  c26889c9a23deb04287167f5e5fce476

                                                                                                  SHA1

                                                                                                  f020838b92e6e8c7aa1cd1935ba43274d8397934

                                                                                                  SHA256

                                                                                                  db9fffbe010ee317ae713d6dbff53879c4c37114c21e5f1ff07596ae7023c1fc

                                                                                                  SHA512

                                                                                                  7dee239fabfeb88dea85350cddd61735c8d3b8636caae5f911244e5268d36453df52ea1e2fae8f7b20c371495f000ba89458bd10868ca3a54a36a055f002bc6f

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\RevisitationBloomfilter

                                                                                                  Filesize

                                                                                                  392B

                                                                                                  MD5

                                                                                                  27e8c3372d67e75ad288c9e843ceb29f

                                                                                                  SHA1

                                                                                                  dde56504d2d4422b8e6bd81e9663f9e64232078b

                                                                                                  SHA256

                                                                                                  eb59f8f17241b8eadf33658de077f13ee7b1cad8f0e9c614297f2897c54d9f97

                                                                                                  SHA512

                                                                                                  41ea483e51cd9ab8a69c070b79e32e8c0a3e9cafe9927254f36647494cfa46c8d0d9b7d15f3836e734c5204383090078a614c1ede169d6081394e1090b790dad

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\RevisitationBloomfilter

                                                                                                  Filesize

                                                                                                  392B

                                                                                                  MD5

                                                                                                  a5936a7c37f4e66a1ecb8b307eb4a263

                                                                                                  SHA1

                                                                                                  33773595d49393a7b6b379fc5c15c785a27e875e

                                                                                                  SHA256

                                                                                                  65018e7cca295e4702cfc85c9bc5a9391dd8e8cddf44c2600522ecd34ad813d7

                                                                                                  SHA512

                                                                                                  54bd2d549b4f2aaa0d50635fa4ca3b5d0941704fce8860b264625e6523ebf0648c4e331b429badbb3b616e906fac5114d14a517fa14563be98c994e64b96deb4

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\RevisitationBloomfilter

                                                                                                  Filesize

                                                                                                  392B

                                                                                                  MD5

                                                                                                  e988d82a324da5f0ac5941eb75797deb

                                                                                                  SHA1

                                                                                                  a4cc71a31c133b5efdcff884bd74aa9e88d66c08

                                                                                                  SHA256

                                                                                                  564bce96f292963c76dd9214594dca2965a51c2915fdd346908b5f62ca1ffab2

                                                                                                  SHA512

                                                                                                  486f0ca917e4db4da366fffe421d2cece922f6c47edf186d0821fe70bbad96e8457a63c9ae957d1731c6e89227f8a465bf0868eca981258a8cdad93149db50eb

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\RevisitationBloomfilter

                                                                                                  Filesize

                                                                                                  392B

                                                                                                  MD5

                                                                                                  860b425d48ab69c3550bff41a62bf390

                                                                                                  SHA1

                                                                                                  688b0891e236e5262001fb339d72a96b1d82d245

                                                                                                  SHA256

                                                                                                  813edbd6d54893374830338ac1dd54980cfdb6635b12d5ccab851d93d22eb376

                                                                                                  SHA512

                                                                                                  a27df251d02ccba56f27cbfebb84cf4bf62f682a19d0c430f88ef36cb8469c2c398dd93992c5896005ca0ea995418d50d48b40d936062ea5f17370f36df224fe

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\RevisitationBloomfilter~RFe583da0.TMP

                                                                                                  Filesize

                                                                                                  392B

                                                                                                  MD5

                                                                                                  d1c78a866e1fa96fc5599369376022fb

                                                                                                  SHA1

                                                                                                  3c9cc05c88215b6de702420c5b65ab387c858b04

                                                                                                  SHA256

                                                                                                  95702e81168cef922ab573e0e5bbbeecd2c65ee4268b371dbdf084aef5db3452

                                                                                                  SHA512

                                                                                                  ff43ba7d4072ba9a2e4cc181acb5034a44b615243a3d5b36de661cef2bb44076fa07dbc331f70349f6e850c1ebd070fbb3e438fc461d0392d51478fe5c60fffd

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                                                                                                  Filesize

                                                                                                  896KB

                                                                                                  MD5

                                                                                                  962f665ecd520cdbdedcdf6f574e5555

                                                                                                  SHA1

                                                                                                  023c10519d91510960bbb8e989773ae01b5574eb

                                                                                                  SHA256

                                                                                                  281f10492a2f6df878df2af5c1753434ce05ab26f4fe30f76d80da53d391e5bf

                                                                                                  SHA512

                                                                                                  936f26b0e4036612e9c4843f8aee4faaa20d890fe260a9197ecd04c9d4c8664250ebe3127901e27fba8754f325348fce63cd79dc3b8b3e963726fb43abf2ecc7

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres

                                                                                                  Filesize

                                                                                                  2KB

                                                                                                  MD5

                                                                                                  7f9cc5bbad0add8ab1331c74e9c1860f

                                                                                                  SHA1

                                                                                                  faecef0cf66e23ab7431207c12d679493cf96335

                                                                                                  SHA256

                                                                                                  55844bcd033c787c3442e6bb04486f07c8f9c9ebb36ca5d58ba55fe58417507b

                                                                                                  SHA512

                                                                                                  40e7caaccadb2ae9a05b85186dba787fbfece0d411272d59cdecde084fea0fcceebfe8f326332305b70cf1b2b59f0278b79121a43bcd35e50603f6bcc9936814

                                                                                                • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

                                                                                                  Filesize

                                                                                                  9KB

                                                                                                  MD5

                                                                                                  7050d5ae8acfbe560fa11073fef8185d

                                                                                                  SHA1

                                                                                                  5bc38e77ff06785fe0aec5a345c4ccd15752560e

                                                                                                  SHA256

                                                                                                  cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

                                                                                                  SHA512

                                                                                                  a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

                                                                                                • C:\Users\Admin\AppData\Local\Temp\9f77a1af-cf21-48e4-b0e9-8a88bf043732.tmp

                                                                                                  Filesize

                                                                                                  1B

                                                                                                  MD5

                                                                                                  5058f1af8388633f609cadb75a75dc9d

                                                                                                  SHA1

                                                                                                  3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                  SHA256

                                                                                                  cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                  SHA512

                                                                                                  0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                • C:\Users\Admin\AppData\Local\Temp\one.rtf

                                                                                                  Filesize

                                                                                                  403B

                                                                                                  MD5

                                                                                                  6fbd6ce25307749d6e0a66ebbc0264e7

                                                                                                  SHA1

                                                                                                  faee71e2eac4c03b96aabecde91336a6510fff60

                                                                                                  SHA256

                                                                                                  e152b106733d9263d3cf175f0b6197880d70acb753f8bde8035a3e4865b31690

                                                                                                  SHA512

                                                                                                  35a0d6d91178ec10619cf4d2fd44d3e57aa0266e1779e15b1eef6e9c359c77c384e0ffe4edb2cde980a6847e53f47733e6eacb72d46762066b3541dee3d29064

                                                                                                • C:\Users\Admin\AppData\Local\Temp\rniw.exe

                                                                                                  Filesize

                                                                                                  76KB

                                                                                                  MD5

                                                                                                  9232120b6ff11d48a90069b25aa30abc

                                                                                                  SHA1

                                                                                                  97bb45f4076083fca037eee15d001fd284e53e47

                                                                                                  SHA256

                                                                                                  70faa0e1498461731f873d3594f20cbf2beaa6f123a06b66f9df59a9cdf862be

                                                                                                  SHA512

                                                                                                  b06688a9fc0b853d2895f11e812c48d5871f2793183fda5e9638ded22fc5dc1e813f174baedc980a1f0b6a7b0a65cd61f29bb16acc6dd45da62988eb012d6877

                                                                                                • C:\Users\Admin\AppData\Local\Temp\text.txt

                                                                                                  Filesize

                                                                                                  396B

                                                                                                  MD5

                                                                                                  9037ebf0a18a1c17537832bc73739109

                                                                                                  SHA1

                                                                                                  1d951dedfa4c172a1aa1aae096cfb576c1fb1d60

                                                                                                  SHA256

                                                                                                  38c889b5d7bdcb79bbcb55554c520a9ce74b5bfc29c19d1e4cb1419176c99f48

                                                                                                  SHA512

                                                                                                  4fb5c06089524c6dcd48b6d165cedb488e9efe2d27613289ef8834dbb6c010632d2bd5e3ac75f83b1d8024477ebdf05b9e0809602bbe1780528947c36e4de32f

                                                                                                • C:\Users\Admin\AppData\Local\Temp\windl.bat

                                                                                                  Filesize

                                                                                                  771B

                                                                                                  MD5

                                                                                                  a9401e260d9856d1134692759d636e92

                                                                                                  SHA1

                                                                                                  4141d3c60173741e14f36dfe41588bb2716d2867

                                                                                                  SHA256

                                                                                                  b551fba71dfd526d4916ae277d8686d83fff36d22fcf6f18457924a070b30ef7

                                                                                                  SHA512

                                                                                                  5cbe38cdab0283b87d9a9875f7ba6fa4e8a7673d933ca05deddddbcf6cf793bd1bf34ac0add798b4ed59ab483e49f433ce4012f571a658bc0add28dd987a57b6

                                                                                                • C:\Users\Admin\Downloads\000.exe

                                                                                                  Filesize

                                                                                                  6.7MB

                                                                                                  MD5

                                                                                                  f2b7074e1543720a9a98fda660e02688

                                                                                                  SHA1

                                                                                                  1029492c1a12789d8af78d54adcb921e24b9e5ca

                                                                                                  SHA256

                                                                                                  4ea1f2ecf7eb12896f2cbf8683dae8546d2b8dc43cf7710d68ce99e127c0a966

                                                                                                  SHA512

                                                                                                  73f9548633bc38bab64b1dd5a01401ef7f5b139163bdf291cc475dbd2613510c4c5e4d7702ecdfa74b49f3c9eaed37ed23b9d8f0064c66123eb0769c8671c6ff

                                                                                                • C:\Users\Admin\Downloads\Alerta.exe

                                                                                                  Filesize

                                                                                                  111KB

                                                                                                  MD5

                                                                                                  e8ed8aaf35e6059ba28504c19ff50bab

                                                                                                  SHA1

                                                                                                  01412235baf64c5b928252639369eea4e2ba5192

                                                                                                  SHA256

                                                                                                  2d2a22db20a44474afbd7b0e6488690bad584dcae9789a5db776cc1a00b98728

                                                                                                  SHA512

                                                                                                  d007c96b2fad26763d27be8447ca65e0ab890deb6388b90cf83c0b3431e09b225f7424098927b54f15fe34eae953b61b45371b0df4b2d89c60be9c006ffe9034

                                                                                                • C:\Users\Admin\Downloads\Gas.exe.crdownload

                                                                                                  Filesize

                                                                                                  18KB

                                                                                                  MD5

                                                                                                  e7af185503236e623705368a443a17d9

                                                                                                  SHA1

                                                                                                  863084d6e7f3ed1ba6cc43f0746445b9ad218474

                                                                                                  SHA256

                                                                                                  da3f40b66cc657ea33dbf547eb05d8d4fb5fb5cf753689d0222039a3292c937a

                                                                                                  SHA512

                                                                                                  8db51d9029dfb0a1a112899ca1f1dacfd37ae9dec4d07594900c5725bc0f60212ab69395f560b30b20f6e1dffba84d585ef5ae2b43f77c3d5373fe481a8b8fc3

                                                                                                • C:\Users\Admin\Downloads\LoveYou.exe

                                                                                                  Filesize

                                                                                                  22KB

                                                                                                  MD5

                                                                                                  31420227141ade98a5a5228bf8e6a97d

                                                                                                  SHA1

                                                                                                  19329845635ebbc5c4026e111650d3ef42ab05ac

                                                                                                  SHA256

                                                                                                  1edc8771e2a1a70023fc9ddeb5a6bc950380224b75e8306eb70da8eb80cb5b71

                                                                                                  SHA512

                                                                                                  cbb18a6667b377eb68395cfd8df52b7d93c4554c3b5ab32c70e73b86e3dedb7949122fe8eea9530cd53944b45a1b699380bf1e9e5254af04d8409c594a52c0e7

                                                                                                • C:\Users\Admin\Downloads\PCToaster.exe

                                                                                                  Filesize

                                                                                                  411KB

                                                                                                  MD5

                                                                                                  04251a49a240dbf60975ac262fc6aeb7

                                                                                                  SHA1

                                                                                                  e211ca63af2ab85ffab1e5fbbdf28a4ef8f77de0

                                                                                                  SHA256

                                                                                                  85a58aa96dccd94316a34608ba996656a22c8158d5156b6e454d9d69e6ff38c3

                                                                                                  SHA512

                                                                                                  3422a231e1dadb68d3567a99d46791392ecf5883fd3bbc2cae19a595364dac46e4b2712db70b61b488937d906413d39411554034ffd3058389700a93c17568d2

                                                                                                • C:\Users\Admin\Downloads\scr.txt

                                                                                                  Filesize

                                                                                                  45B

                                                                                                  MD5

                                                                                                  ad1869d6f0b2b809394605d3e73eeb74

                                                                                                  SHA1

                                                                                                  4bdedd14bfea9f891b98c4cc82c5f82a58df67f6

                                                                                                  SHA256

                                                                                                  7e9cde40095f2a877375cb30fecd4f64cf328e3ab11baed5242f73cbb94bd394

                                                                                                  SHA512

                                                                                                  8fe0f269daf94feaa246a644dbeeda52916855f1d2bfd2c6c876c7c9c80b0ceb7e42caf0b64a70bda9a64d4529b885aaa38998a515d6abbe88ad367e72324136

                                                                                                • memory/60-1040-0x0000000000400000-0x000000000046E000-memory.dmp

                                                                                                  Filesize

                                                                                                  440KB

                                                                                                • memory/1848-1062-0x0000016920940000-0x0000016920941000-memory.dmp

                                                                                                  Filesize

                                                                                                  4KB

                                                                                                • memory/1848-1162-0x0000016920940000-0x0000016920941000-memory.dmp

                                                                                                  Filesize

                                                                                                  4KB

                                                                                                • memory/1848-1069-0x0000016920940000-0x0000016920941000-memory.dmp

                                                                                                  Filesize

                                                                                                  4KB

                                                                                                • memory/1848-1091-0x0000016920940000-0x0000016920941000-memory.dmp

                                                                                                  Filesize

                                                                                                  4KB

                                                                                                • memory/4852-1260-0x000000000CE20000-0x000000000CE30000-memory.dmp

                                                                                                  Filesize

                                                                                                  64KB

                                                                                                • memory/4852-1256-0x000000000CC60000-0x000000000CC70000-memory.dmp

                                                                                                  Filesize

                                                                                                  64KB

                                                                                                • memory/4852-1259-0x000000000CC60000-0x000000000CC70000-memory.dmp

                                                                                                  Filesize

                                                                                                  64KB

                                                                                                • memory/4852-1258-0x000000000CC60000-0x000000000CC70000-memory.dmp

                                                                                                  Filesize

                                                                                                  64KB

                                                                                                • memory/4852-1257-0x000000000CC60000-0x000000000CC70000-memory.dmp

                                                                                                  Filesize

                                                                                                  64KB

                                                                                                • memory/4852-1235-0x0000000006850000-0x0000000006DF6000-memory.dmp

                                                                                                  Filesize

                                                                                                  5.6MB

                                                                                                • memory/4852-1263-0x000000000CC60000-0x000000000CC70000-memory.dmp

                                                                                                  Filesize

                                                                                                  64KB

                                                                                                • memory/4852-1262-0x000000000CC60000-0x000000000CC70000-memory.dmp

                                                                                                  Filesize

                                                                                                  64KB

                                                                                                • memory/4852-1264-0x000000000CE20000-0x000000000CE30000-memory.dmp

                                                                                                  Filesize

                                                                                                  64KB

                                                                                                • memory/4852-1261-0x000000000CE20000-0x000000000CE30000-memory.dmp

                                                                                                  Filesize

                                                                                                  64KB

                                                                                                • memory/4852-1234-0x00000000007B0000-0x0000000000E5E000-memory.dmp

                                                                                                  Filesize

                                                                                                  6.7MB

                                                                                                • memory/4852-1251-0x000000000CC00000-0x000000000CC38000-memory.dmp

                                                                                                  Filesize

                                                                                                  224KB

                                                                                                • memory/4852-1252-0x000000000C180000-0x000000000C18E000-memory.dmp

                                                                                                  Filesize

                                                                                                  56KB