Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/07/2024, 05:17

General

  • Target

    https://ify.ac/1Ic5

Malware Config

Signatures

  • Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 20 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 58 IoCs
  • NSIS installer 2 IoCs
  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies registry class 1 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 47 IoCs
  • Suspicious use of FindShellTrayWindow 46 IoCs
  • Suspicious use of SendNotifyMessage 34 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://ify.ac/1Ic5
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4964
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8fd0246f8,0x7ff8fd024708,0x7ff8fd024718
      2⤵
        PID:4724
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,13487906119998437956,15264673339208653544,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:2
        2⤵
          PID:4652
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,13487906119998437956,15264673339208653544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2924
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,13487906119998437956,15264673339208653544,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:8
          2⤵
            PID:4368
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13487906119998437956,15264673339208653544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:1
            2⤵
              PID:228
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13487906119998437956,15264673339208653544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:1
              2⤵
                PID:688
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,13487906119998437956,15264673339208653544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:8
                2⤵
                  PID:2744
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,13487906119998437956,15264673339208653544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:116
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=qrcode_generator.mojom.QRCodeGeneratorService --field-trial-handle=2160,13487906119998437956,15264673339208653544,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5416 /prefetch:8
                  2⤵
                    PID:1900
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13487906119998437956,15264673339208653544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:1
                    2⤵
                      PID:3608
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13487906119998437956,15264673339208653544,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:1
                      2⤵
                        PID:4408
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13487906119998437956,15264673339208653544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:1
                        2⤵
                          PID:1396
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13487906119998437956,15264673339208653544,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:1
                          2⤵
                            PID:2932
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13487906119998437956,15264673339208653544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3000 /prefetch:1
                            2⤵
                              PID:3056
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13487906119998437956,15264673339208653544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:1
                              2⤵
                                PID:2868
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13487906119998437956,15264673339208653544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6404 /prefetch:1
                                2⤵
                                  PID:2996
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2160,13487906119998437956,15264673339208653544,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4720 /prefetch:8
                                  2⤵
                                    PID:5112
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13487906119998437956,15264673339208653544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:1
                                    2⤵
                                      PID:4000
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2160,13487906119998437956,15264673339208653544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6560 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:4232
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13487906119998437956,15264673339208653544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:1
                                      2⤵
                                        PID:2228
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13487906119998437956,15264673339208653544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6796 /prefetch:1
                                        2⤵
                                          PID:2940
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,13487906119998437956,15264673339208653544,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3436 /prefetch:2
                                          2⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:232
                                      • C:\Windows\System32\CompPkgSrv.exe
                                        C:\Windows\System32\CompPkgSrv.exe -Embedding
                                        1⤵
                                          PID:3664
                                        • C:\Windows\System32\CompPkgSrv.exe
                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                          1⤵
                                            PID:1152
                                          • C:\Windows\System32\rundll32.exe
                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                            1⤵
                                              PID:3760
                                            • C:\Users\Admin\Desktop\setup_UQNFVEhrLG.exe
                                              "C:\Users\Admin\Desktop\setup_UQNFVEhrLG.exe"
                                              1⤵
                                                PID:3568
                                                • C:\Users\Admin\AppData\Local\Temp\is-B5H7O.tmp\setup_UQNFVEhrLG.tmp
                                                  "C:\Users\Admin\AppData\Local\Temp\is-B5H7O.tmp\setup_UQNFVEhrLG.tmp" /SL5="$40230,5899231,56832,C:\Users\Admin\Desktop\setup_UQNFVEhrLG.exe"
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of FindShellTrayWindow
                                                  PID:1816
                                                  • C:\Windows\SysWOW64\schtasks.exe
                                                    "C:\Windows\system32\schtasks.exe" /Delete /F /TN "dj_minor_adequate_7161"
                                                    3⤵
                                                      PID:1980
                                                    • C:\Users\Admin\AppData\Local\DJ Minor Adequate\djminoradequate.exe
                                                      "C:\Users\Admin\AppData\Local\DJ Minor Adequate\djminoradequate.exe" 17fabde59324ee5a8c53dd977ea467fa
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:3444
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 884
                                                        4⤵
                                                        • Program crash
                                                        PID:1412
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 896
                                                        4⤵
                                                        • Program crash
                                                        PID:2288
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 948
                                                        4⤵
                                                        • Program crash
                                                        PID:3664
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1092
                                                        4⤵
                                                        • Program crash
                                                        PID:4428
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1080
                                                        4⤵
                                                        • Program crash
                                                        PID:4568
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1080
                                                        4⤵
                                                        • Program crash
                                                        PID:4692
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1164
                                                        4⤵
                                                        • Program crash
                                                        PID:4752
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1280
                                                        4⤵
                                                        • Program crash
                                                        PID:4856
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1288
                                                        4⤵
                                                        • Program crash
                                                        PID:4764
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1364
                                                        4⤵
                                                        • Program crash
                                                        PID:2288
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1000
                                                        4⤵
                                                        • Program crash
                                                        PID:3664
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1368
                                                        4⤵
                                                        • Program crash
                                                        PID:2872
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1712
                                                        4⤵
                                                        • Program crash
                                                        PID:4868
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 964
                                                        4⤵
                                                        • Program crash
                                                        PID:1840
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1716
                                                        4⤵
                                                        • Program crash
                                                        PID:3672
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1784
                                                        4⤵
                                                        • Program crash
                                                        PID:1624
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1936
                                                        4⤵
                                                        • Program crash
                                                        PID:2944
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2128
                                                        4⤵
                                                        • Program crash
                                                        PID:864
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://t.me/bboobies
                                                        4⤵
                                                          PID:3896
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x130,0x134,0x138,0x10c,0x13c,0x7ff8fd0246f8,0x7ff8fd024708,0x7ff8fd024718
                                                            5⤵
                                                              PID:1724
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1848
                                                            4⤵
                                                            • Program crash
                                                            PID:2464
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1876
                                                            4⤵
                                                            • Program crash
                                                            PID:4988
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1880
                                                            4⤵
                                                            • Program crash
                                                            PID:5028
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1380
                                                            4⤵
                                                            • Program crash
                                                            PID:3608
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1832
                                                            4⤵
                                                            • Program crash
                                                            PID:3552
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2236
                                                            4⤵
                                                            • Program crash
                                                            PID:4492
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2264
                                                            4⤵
                                                            • Program crash
                                                            PID:3052
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2224
                                                            4⤵
                                                            • Program crash
                                                            PID:4012
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1904
                                                            4⤵
                                                            • Program crash
                                                            PID:3624
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1856
                                                            4⤵
                                                            • Program crash
                                                            PID:3548
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2040
                                                            4⤵
                                                            • Program crash
                                                            PID:1412
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2016
                                                            4⤵
                                                            • Program crash
                                                            PID:4780
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2004
                                                            4⤵
                                                            • Program crash
                                                            PID:3612
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2028
                                                            4⤵
                                                            • Program crash
                                                            PID:4956
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1908
                                                            4⤵
                                                            • Program crash
                                                            PID:1268
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1904
                                                            4⤵
                                                            • Program crash
                                                            PID:448
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1904
                                                            4⤵
                                                            • Program crash
                                                            PID:2980
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2016
                                                            4⤵
                                                            • Program crash
                                                            PID:3312
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1864
                                                            4⤵
                                                            • Program crash
                                                            PID:4780
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2264
                                                            4⤵
                                                            • Program crash
                                                            PID:864
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            C:\Windows\system32\cmd.exe /c powershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\kFI41UvV\KKiN1HZXfoqF.exe"
                                                            4⤵
                                                              PID:2464
                                                              • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                powershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\kFI41UvV\KKiN1HZXfoqF.exe"
                                                                5⤵
                                                                • Command and Scripting Interpreter: PowerShell
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                PID:1980
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2316
                                                              4⤵
                                                              • Program crash
                                                              PID:3624
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2328
                                                              4⤵
                                                              • Program crash
                                                              PID:2188
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c powershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\EGDePcmj\KPUahvThg.exe"
                                                              4⤵
                                                                PID:5112
                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                  powershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\EGDePcmj\KPUahvThg.exe"
                                                                  5⤵
                                                                  • Command and Scripting Interpreter: PowerShell
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  PID:3672
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2008
                                                                4⤵
                                                                • Program crash
                                                                PID:4432
                                                              • C:\Users\Admin\AppData\Local\Temp\kFI41UvV\KKiN1HZXfoqF.exe
                                                                C:\Users\Admin\AppData\Local\Temp\kFI41UvV\KKiN1HZXfoqF.exe /sid=3 /pid=1090
                                                                4⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                PID:5088
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 876
                                                                4⤵
                                                                • Program crash
                                                                PID:4320
                                                              • C:\Users\Admin\AppData\Local\Temp\EGDePcmj\KPUahvThg.exe
                                                                C:\Users\Admin\AppData\Local\Temp\EGDePcmj\KPUahvThg.exe
                                                                4⤵
                                                                • Executes dropped EXE
                                                                PID:5312
                                                                • C:\Users\Admin\AppData\Local\Temp\is-LU2GI.tmp\KPUahvThg.tmp
                                                                  "C:\Users\Admin\AppData\Local\Temp\is-LU2GI.tmp\KPUahvThg.tmp" /SL5="$5036E,4415326,54272,C:\Users\Admin\AppData\Local\Temp\EGDePcmj\KPUahvThg.exe"
                                                                  5⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  PID:5372
                                                                  • C:\Users\Admin\AppData\Local\Free Video Player\freevideoplayer.exe
                                                                    "C:\Users\Admin\AppData\Local\Free Video Player\freevideoplayer.exe" -i
                                                                    6⤵
                                                                    • Executes dropped EXE
                                                                    PID:5716
                                                                  • C:\Users\Admin\AppData\Local\Free Video Player\freevideoplayer.exe
                                                                    "C:\Users\Admin\AppData\Local\Free Video Player\freevideoplayer.exe" -s
                                                                    6⤵
                                                                    • Executes dropped EXE
                                                                    PID:5784
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2404
                                                                4⤵
                                                                • Program crash
                                                                PID:5396
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 876
                                                                4⤵
                                                                • Program crash
                                                                PID:5600
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2392
                                                                4⤵
                                                                • Program crash
                                                                PID:5792
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2212
                                                                4⤵
                                                                • Program crash
                                                                PID:5872
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c powershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\fLWUzBAt\qhXb5.exe"
                                                                4⤵
                                                                  PID:5936
                                                                  • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                    powershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\fLWUzBAt\qhXb5.exe"
                                                                    5⤵
                                                                    • Command and Scripting Interpreter: PowerShell
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:6000
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2276
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:5952
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2344
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:6132
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1884
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:2188
                                                                • C:\Users\Admin\AppData\Local\Temp\fLWUzBAt\qhXb5.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\fLWUzBAt\qhXb5.exe --silent --allusers=0
                                                                  4⤵
                                                                  • Executes dropped EXE
                                                                  PID:5152
                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS024C50C9\setup.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\7zS024C50C9\setup.exe --silent --allusers=0 --server-tracking-blob=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
                                                                    5⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    • Enumerates connected drives
                                                                    • Modifies system certificate store
                                                                    PID:4956
                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS024C50C9\setup.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\7zS024C50C9\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=112.0.5197.24 --initial-client-data=0x300,0x324,0x328,0x2d4,0x32c,0x71a7b1f4,0x71a7b200,0x71a7b20c
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      PID:5296
                                                                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe" --version
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      PID:5440
                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS024C50C9\setup.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\7zS024C50C9\setup.exe" --backend --install --import-browser-data=0 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=en --singleprofile=0 --copyonly=0 --allusers=0 --setdefaultbrowser=1 --pintotaskbar=1 --pintostartmenu=1 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=4956 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20240716052030" --session-guid=86f75428-62d1-47df-91c7-b6627cda6e95 --server-tracking-blob=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 --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=C005000000000000
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      • Enumerates connected drives
                                                                      PID:5540
                                                                      • C:\Users\Admin\AppData\Local\Temp\7zS024C50C9\setup.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\7zS024C50C9\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=112.0.5197.24 --initial-client-data=0x32c,0x330,0x334,0x2fc,0x338,0x6d62b1f4,0x6d62b200,0x6d62b20c
                                                                        7⤵
                                                                        • Executes dropped EXE
                                                                        • Loads dropped DLL
                                                                        PID:5704
                                                                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202407160520301\assistant\Assistant_111.0.5168.25_Setup.exe_sfx.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202407160520301\assistant\Assistant_111.0.5168.25_Setup.exe_sfx.exe"
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      PID:5560
                                                                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202407160520301\assistant\assistant_installer.exe
                                                                      "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202407160520301\assistant\assistant_installer.exe" --version
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      PID:5268
                                                                      • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202407160520301\assistant\assistant_installer.exe
                                                                        "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202407160520301\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector.opera.com/collector/submit --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=111.0.5168.25 --initial-client-data=0x23c,0x240,0x244,0x218,0x248,0x469f88,0x469f94,0x469fa0
                                                                        7⤵
                                                                        • Executes dropped EXE
                                                                        • Loads dropped DLL
                                                                        PID:5380
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2344
                                                                  4⤵
                                                                  • Program crash
                                                                  PID:1852
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c powershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\0XJ00v4Q\KYwe49rvGiycgh7.exe"
                                                                  4⤵
                                                                    PID:5248
                                                                    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                      powershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\0XJ00v4Q\KYwe49rvGiycgh7.exe"
                                                                      5⤵
                                                                      • Command and Scripting Interpreter: PowerShell
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:5448
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2272
                                                                    4⤵
                                                                    • Program crash
                                                                    PID:5244
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2328
                                                                    4⤵
                                                                    • Program crash
                                                                    PID:5636
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2232
                                                                    4⤵
                                                                    • Program crash
                                                                    PID:5808
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1812
                                                                    4⤵
                                                                    • Program crash
                                                                    PID:6096
                                                                  • C:\Users\Admin\AppData\Local\Temp\0XJ00v4Q\KYwe49rvGiycgh7.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\0XJ00v4Q\KYwe49rvGiycgh7.exe /did=757674 /S
                                                                    4⤵
                                                                    • Checks BIOS information in registry
                                                                    • Checks computer location settings
                                                                    • Executes dropped EXE
                                                                    • Enumerates system info in registry
                                                                    PID:6100
                                                                    • C:\Windows\SysWOW64\forfiles.exe
                                                                      "C:\Windows\System32\forfiles.exe" /p c:\windows\system32 /m where.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                                      5⤵
                                                                        PID:5468
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                          6⤵
                                                                            PID:5512
                                                                            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                              powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                              7⤵
                                                                              • Command and Scripting Interpreter: PowerShell
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                              PID:5344
                                                                              • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                8⤵
                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                PID:5776
                                                                        • C:\Windows\SysWOW64\schtasks.exe
                                                                          schtasks /CREATE /TN "bEtnHIcecDUtXwQuWS" /SC once /ST 05:21:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\0XJ00v4Q\KYwe49rvGiycgh7.exe\" z0 /iFdidt 757674 /S" /V1 /F
                                                                          5⤵
                                                                          • Drops file in Windows directory
                                                                          • Scheduled Task/Job: Scheduled Task
                                                                          PID:5488
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2268
                                                                        4⤵
                                                                        • Program crash
                                                                        PID:6120
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1824
                                                                        4⤵
                                                                        • Program crash
                                                                        PID:6020
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 2028
                                                                        4⤵
                                                                        • Program crash
                                                                        PID:5992
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 3444 -s 1960
                                                                        4⤵
                                                                        • Program crash
                                                                        PID:2368
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3444 -ip 3444
                                                                  1⤵
                                                                    PID:3600
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3444 -ip 3444
                                                                    1⤵
                                                                      PID:4024
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 3444 -ip 3444
                                                                      1⤵
                                                                        PID:4976
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3444 -ip 3444
                                                                        1⤵
                                                                          PID:4356
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 3444 -ip 3444
                                                                          1⤵
                                                                            PID:692
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 3444 -ip 3444
                                                                            1⤵
                                                                              PID:3480
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 3444 -ip 3444
                                                                              1⤵
                                                                                PID:4908
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3444 -ip 3444
                                                                                1⤵
                                                                                  PID:2616
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 544 -p 3444 -ip 3444
                                                                                  1⤵
                                                                                    PID:2996
                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 584 -p 3444 -ip 3444
                                                                                    1⤵
                                                                                      PID:4876
                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 580 -p 3444 -ip 3444
                                                                                      1⤵
                                                                                        PID:232
                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 596 -p 3444 -ip 3444
                                                                                        1⤵
                                                                                          PID:4440
                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 604 -p 3444 -ip 3444
                                                                                          1⤵
                                                                                            PID:1764
                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3444 -ip 3444
                                                                                            1⤵
                                                                                              PID:1248
                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 628 -p 3444 -ip 3444
                                                                                              1⤵
                                                                                                PID:3416
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 3444 -ip 3444
                                                                                                1⤵
                                                                                                  PID:3600
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 3444 -ip 3444
                                                                                                  1⤵
                                                                                                    PID:4024
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 656 -p 3444 -ip 3444
                                                                                                    1⤵
                                                                                                      PID:1320
                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 3444 -ip 3444
                                                                                                      1⤵
                                                                                                        PID:4492
                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 3444 -ip 3444
                                                                                                        1⤵
                                                                                                          PID:208
                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 3444 -ip 3444
                                                                                                          1⤵
                                                                                                            PID:3348
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 700 -p 3444 -ip 3444
                                                                                                            1⤵
                                                                                                              PID:3012
                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 3444 -ip 3444
                                                                                                              1⤵
                                                                                                                PID:1292
                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 3444 -ip 3444
                                                                                                                1⤵
                                                                                                                  PID:864
                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 616 -p 3444 -ip 3444
                                                                                                                  1⤵
                                                                                                                    PID:4792
                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 712 -p 3444 -ip 3444
                                                                                                                    1⤵
                                                                                                                      PID:2460
                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 3444 -ip 3444
                                                                                                                      1⤵
                                                                                                                        PID:4224
                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3444 -ip 3444
                                                                                                                        1⤵
                                                                                                                          PID:3644
                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 3444 -ip 3444
                                                                                                                          1⤵
                                                                                                                            PID:4856
                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 664 -p 3444 -ip 3444
                                                                                                                            1⤵
                                                                                                                              PID:1340
                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 676 -p 3444 -ip 3444
                                                                                                                              1⤵
                                                                                                                                PID:2732
                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 708 -p 3444 -ip 3444
                                                                                                                                1⤵
                                                                                                                                  PID:5112
                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 716 -p 3444 -ip 3444
                                                                                                                                  1⤵
                                                                                                                                    PID:768
                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 692 -p 3444 -ip 3444
                                                                                                                                    1⤵
                                                                                                                                      PID:1120
                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 748 -p 3444 -ip 3444
                                                                                                                                      1⤵
                                                                                                                                        PID:1852
                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 620 -p 3444 -ip 3444
                                                                                                                                        1⤵
                                                                                                                                          PID:1788
                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 736 -p 3444 -ip 3444
                                                                                                                                          1⤵
                                                                                                                                            PID:4432
                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 3444 -ip 3444
                                                                                                                                            1⤵
                                                                                                                                              PID:4320
                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 3444 -ip 3444
                                                                                                                                              1⤵
                                                                                                                                                PID:952
                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 808 -p 3444 -ip 3444
                                                                                                                                                1⤵
                                                                                                                                                  PID:4752
                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 696 -p 3444 -ip 3444
                                                                                                                                                  1⤵
                                                                                                                                                    PID:4752
                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 776 -p 3444 -ip 3444
                                                                                                                                                    1⤵
                                                                                                                                                      PID:4320
                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 784 -p 3444 -ip 3444
                                                                                                                                                      1⤵
                                                                                                                                                        PID:5300
                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 3444 -ip 3444
                                                                                                                                                        1⤵
                                                                                                                                                          PID:5572
                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 740 -p 3444 -ip 3444
                                                                                                                                                          1⤵
                                                                                                                                                            PID:5732
                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 688 -p 3444 -ip 3444
                                                                                                                                                            1⤵
                                                                                                                                                              PID:5848
                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 3444 -ip 3444
                                                                                                                                                              1⤵
                                                                                                                                                                PID:5908
                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 784 -p 3444 -ip 3444
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:6104
                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 3444 -ip 3444
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:4432
                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 704 -p 3444 -ip 3444
                                                                                                                                                                    1⤵
                                                                                                                                                                      PID:5160
                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 752 -p 3444 -ip 3444
                                                                                                                                                                      1⤵
                                                                                                                                                                        PID:3608
                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 724 -p 3444 -ip 3444
                                                                                                                                                                        1⤵
                                                                                                                                                                          PID:5400
                                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 3444 -ip 3444
                                                                                                                                                                          1⤵
                                                                                                                                                                            PID:5840
                                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 660 -p 3444 -ip 3444
                                                                                                                                                                            1⤵
                                                                                                                                                                              PID:6072
                                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 3444 -ip 3444
                                                                                                                                                                              1⤵
                                                                                                                                                                                PID:6124
                                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 772 -p 3444 -ip 3444
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:4432
                                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 732 -p 3444 -ip 3444
                                                                                                                                                                                  1⤵
                                                                                                                                                                                    PID:5984
                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 632 -p 3444 -ip 3444
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:4680

                                                                                                                                                                                    Network

                                                                                                                                                                                    MITRE ATT&CK Enterprise v15

                                                                                                                                                                                    Replay Monitor

                                                                                                                                                                                    Loading Replay Monitor...

                                                                                                                                                                                    Downloads

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\DJ Minor Adequate\djminoradequate.exe

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      4.8MB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      729027711646c548c03043f6e86804f9

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      2dccc1e9af16f30d571795ec19483ba3a90327a0

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      0b492d1aac8cfdc42a75789ff19ebad2662bf7e9fd5b266086bce3c9c508b6f4

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      3a5a539509f9f59b78084c446b4f5fbeab2a8b41473f1bd23ea1b085726f0a48ed625ddae3038ce4e120f4c793f1ba9c6b13e1b9bafde16eee919235f2bb168a

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Free Video Player\freevideoplayer.exe

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      4.6MB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      237ecd4700cbe4067a075be7ea017d93

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      f1d44a1597ace09859d74c027cdef665d7209e68

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      f4e0993a49b614bfb2cdace65421e2c2f7ff1be8e561a6ee4d39be9102402563

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      6ecd087279b65d892d978b10daa56ad97a090a403189dda15183a155ce89d89bee6a68f9e92ab88444a152371bed2135ba729e712ea9e5947be3c4d2d26c8423

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      1KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      4280e36a29fa31c01e4d8b2ba726a0d8

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      c485c2c9ce0a99747b18d899b71dfa9a64dabe32

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      e2486a1bdcba80dad6dd6210d7374bd70ae196a523c06ceda71370fd3ea78359

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      494fe5f0ade03669e5830bed93c964d69b86629440148d7b0881cf53203fd89443ebff9b4d1ee9d96244f62af6edede622d9eacba37f80f389a0d522e4ad4ea4

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      152B

                                                                                                                                                                                      MD5

                                                                                                                                                                                      eaaad45aced1889a90a8aa4c39f92659

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      5c0130d9e8d1a64c97924090d9a5258b8a31b83c

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      5e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      0db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      152B

                                                                                                                                                                                      MD5

                                                                                                                                                                                      3ee50fb26a9d3f096c47ff8696c24321

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      a8c83e798d2a8b31fec0820560525e80dfa4fe66

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000008

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      211KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      151fb811968eaf8efb840908b89dc9d4

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      7ec811009fd9b0e6d92d12d78b002275f2f1bee1

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      043fd8558e4a5a60aaccd2f0377f77a544e3e375242e9d7200dc6e51f94103ed

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      83aface0ab01da52fd077f747c9d5916e3c06b0ea5c551d7d316707ec3e8f3f986ce1c82e6f2136e48c6511a83cb0ac67ff6dc8f0e440ac72fc6854086a87674

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      216B

                                                                                                                                                                                      MD5

                                                                                                                                                                                      9a7f4a7fb07b2209e659401333a497e6

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      75cce50025265c53d5c612bdfe187de422c8a223

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      e16e810bc5781dd03f76ce97e33c92d8c52bb2ba2f2ae64f6145c40eac50e25a

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      8d06cf510feaa8a19c91041f59f2593d0d620b79684167a6f136e85c4f046aca866a8f67da95690b6fd4e660455971a205902af7dcaabb8d0c4159377640e6c9

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      288B

                                                                                                                                                                                      MD5

                                                                                                                                                                                      956ff05d3652085e01143f3ed69c30c2

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      4b34e9bca961087b4a77ec966d01672bb98c821c

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      9803a55f6484cb418e190985a230744ae21fbb24992f7a5b17b1f5a4d642382d

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      8f477b6ebbb5ce4d6f7c5ca6c59400368ee005d7c2aa3eb22a13ed1c457a0a608dab95a7fb6eaa016c893897617d0f2657f91f369a8262a792f9941e37c3989a

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      312B

                                                                                                                                                                                      MD5

                                                                                                                                                                                      5d6c08ef04c4100c6840bd3d7da5e56c

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      76a2118deb9f8c6d3c706952a0ac48e3f1d94201

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      45d1a14ad9a41bdd9f43bd3bd6176a5852d867f7707f4573a7508446db6b6dcf

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      eb7b961659f39e379f869bef58dbd489dd333101ffd6ddaf89a4dcae55381547f269bd6f0cac16df1b32d74f230720e998dd0d8329d9012b0c0154d21112f2a9

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\File System\000\t\Paths\CURRENT

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      16B

                                                                                                                                                                                      MD5

                                                                                                                                                                                      46295cac801e5d4857d09837238a6394

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      2KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      85365a9574598d70962ce3f6ecb0578f

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      e675e0182852c04fbba0ff9d0f2a6cfe295f6c47

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      a39c0cbd946ff57432f9ad7e547faa4305e984368a6daa23b56e3de1c5fe4c38

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      dcfc80408fdb87e881a7b93e25441d9f27a45bb31a4a29da073f03b1880d922a010869111148de683d76c4ab343ad65be78602307b69164175e2649725914071

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      2KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      3a61d147c6550521456e7b33f3924052

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      b0af8adfcaf2baf7f2ccef3761cfcef4173b3af0

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      0882665ccfbbe185bece881ba7386fecef294c372cd0ea7ad2dbee3d8e99675f

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      3d67f32fa528ac9d470422050fdd4a28d3ea1737ead16258914da53a0628dad483128d14514d8a78dfaac214666fbf5cb0b480731645cb0a3885b6eed36843ca

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      6KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      3ae76f90bfc643e044fa38899feb7d4c

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      1887f80844485de10262f189168b5c88453dfda1

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      ad9bf779f7f589392ce0cd0fdb420ceb314d59c0695027b76f748db942855315

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      6bfe63390002c72ad2347f196db58872e3fe28524517b8fba15744297a67e814892893ddfd7d8fb78abc281f34067ef4572c40c89f57356f3c6eb25e805ece15

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      7KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      942a198f0b5dead6faf1f9acd00ebcf2

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      d2afa491485c82a7c50798fa2511e95b472d5622

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      78fa1f49ad55c8b392a33ab06094cd7e0096ecc718e74bf2a46acbc4716f6bea

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      da4a9728d299f5236437321cda7f3705f489b5c8a653f5186f9bb80c9863fb44441e1a1c13288237cf186627a424fdffdff03ba3c75b471d931734d1e6e2449a

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      7KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      3b7bc29768e1af67b6ad64b004959c7a

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      55e99708eb500622ed19e0fc6eda7347fbceb893

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      f491086925f48e6b40a1b2bd9ca9b0732ffea8b84f9fe0608e425577d3412078

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      313631a72995fdfcd372b439dde38eaf2ed0d631aa20c410bfcdfaf56dfa7eee7083fd95540fbad606f57462e774ad20001a23688771a4f559cf152ba774806e

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      7KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      5eddd1fa9c4168db4d80476364cfd2bd

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      a4800fea2d75f9b6f1bcbd60a6127a9a583203ea

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      98145c70147929211e2652fffc7b1db047a764ece764f34f8a8ed2a4456bebe0

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      0553132864eeeb2094531070bae280b4c93067668bede664a830fd3cdc7d7654cadd49217c87453a501a1c0e65c29a48250ad4ed464cafac2f41fbe891536523

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      7KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      d193cdde60810520c2515c4f11430318

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      223adb185fb25175c8362908b8bbd39fed0ca98b

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      7d57ba72b1b377136d81a660d1a8f3f1dfce522495476e558563e2702a55a49c

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      cb2bb761ce383ec884a35913b2bef4f762e636cad40dc150f75ecb60a693195845f7a502eb3af52bef8ea10bdb1c07a61a07c47a4082bad9c5852760090a9a7d

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      7KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      6f5c22c4ac5ab3aa46a4b70049269f32

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      2589917da85fe03811c9cfd3ba0874829151a90a

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      5c33881a3f91623b5a3687b3ea9618c24b756fce007a1e99bd20d05973293977

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      18b8f005e13ed340ea15e8e80fc77a63b99e7dd28239ae8ec2fc67fe392e14e371345203b0cfb6d2e3433929a4b2d720a4117b6bdf299180e4cb81795b4359c7

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      41B

                                                                                                                                                                                      MD5

                                                                                                                                                                                      5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      72B

                                                                                                                                                                                      MD5

                                                                                                                                                                                      abd9132f2341631617a84d9fd93dc145

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      a230fcfca70ebea91c43a8b2caa69c6e4824f901

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      3d4827b043306833e1c11c3f4549aec2c3e47801a9b0cb8f4790359407ef4f2a

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      978cf4267fd8d61789d2ea6c3da1e2fecf6dbcf80c6ecd03fbe62d995bf393a260ef83de8b932dab833da852b6c2b5a398e461971da7a78ae08665ba00cae2ef

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57fcbf.TMP

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      48B

                                                                                                                                                                                      MD5

                                                                                                                                                                                      7292a316c9ea2a9eb2369c1d946ffda7

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      f4ab39ec8cf6726526fa65f62c402c16ee090afa

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      f8c876057eae104ad512b4fe2d837e3b2d3f1f19a7cdee8469004da6a4cdedec

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      522b8e39f2e2b33a43f3831e392a1154c185503850d989dbb51870d4f863e348f3b2f862c2b0105f859da664f7aad446f2f7bc816a0b204da8b1f8b2a2163ef5

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      1KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      2b3addb35a312e585f43f2d4dd8ac5a5

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      ee12fb603402a0e6f6225d37217c27e691bd1fe2

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      82495babf3b7f93b11c0b9f002a900f6e50c7b9ffd097a47dc389c06ec3fe2df

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      b99df4add732c8129942cf1a290a3dca3ed8c495e6f64af229a00e02eafed6a3d90bf53a565e512001ed9656fe68dc31eaf7b2b48b20314afe849d0f4b2338b5

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      540B

                                                                                                                                                                                      MD5

                                                                                                                                                                                      7b4e468d7525356595712d7305391340

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      07cfdcb68a27dbc55bbc6f5a81466370aa7b8c8a

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      90d290f3df2e9827f59867deca9c1da2bb8edf21c7e8e37f2de718bae79a9eda

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      f4cb95317192ec19f69422e5bb43f4ed5978501bcaa21b51464ceb030aa7d3ffecb1d3e8f7b9a67971e6b415f004b4e9d5a61138ce9d20775e3d9a9cc53cdd6a

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      708B

                                                                                                                                                                                      MD5

                                                                                                                                                                                      fc5380985d70f3458ddc19eacb5742f3

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      be88e3ff49ce773fade8da4883c089d872f7f3aa

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      1191925e8ff141278f95ce3c02bd6dadee568fde2bdb1b2eea9b009070242756

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      517fb1d51de4c2c5e25590cef1f6b189bbd39a8af3740daa6bddf90c5307a07b7c65b98dec7e53854e1de3ab868d1ee602001795b1fab7625bc6f6c1e908b2e1

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5810f3.TMP

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      540B

                                                                                                                                                                                      MD5

                                                                                                                                                                                      113d8cc0a2a0ae3ea8c9201f13c6bd0f

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      ed809045d69666a2cbf70c609f1386bef6404eda

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      47370f0eb30593025569bb081797b3ce422669ab0ea7bf432e52441dce5cec04

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      bcdd1b080c77be926190942083180261cd5e1272ee2f239185b152856f984aaae51812cb2ddefced683eeaf60aa6bc8f53ff09696c0552b9fd65990fc994cbfe

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      16B

                                                                                                                                                                                      MD5

                                                                                                                                                                                      6752a1d65b201c13b62ea44016eb221f

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      11KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      460cf1cb9c340eff0a37842c1c987637

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      70e3f77f001be93bba661d33c534e39c4951e2b8

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      607fa6b8a83001e09da80d509a012dccbdd9826e8637388aca10b1895ecb3cb5

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      0406fb16c9646910d55e174aa380e1167671b17ae02831929b9a9858c025da72f1c375d818a763109ed10277c1314a667f24b2c443298eaf9da0af74617680da

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      11KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      b7aa3542eab8b23fec3d8320d010a1d9

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      b73fa5663ad5a2861e0dae77b33f31b85d1aa814

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      b8a5cdcb120a9958618e1ed24f356979ad89b6351dc3d19593c41c97e45233fe

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      19f3a2b87be3748ccc79139b9e922ad04e95972ffc5c5eb95b674d69edf0f240351db2bee00918896ce1bb3d8a54ed990e3c6c29903dea61d81a28b8f8ae24eb

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      11KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      a73758ee66ed2739efbc13fdd87ac3d3

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      b6f2fa26ca7c37976ab4f29346402fd319b44d40

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      edd36657b1962c971f9a20179ccbeba3c7b4c0b25c9cd4a1524b28c3270c4fed

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      166f94fe18f3f27338a992aa06d59a3010c49a090bb575bf1d57615fd8401aafceac2634fa26fc40b0438c3e2b4108ecb04740845cb35bcfadd3dcf6c754da4d

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      16KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      bdf890ae9a315268ce1c43e4a153db84

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      ecbb1445f2cc018ba87b2648b35d7a90a9f31ac8

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      507d1c883f4cf860431778506f8e1707a8572612c2c3a2d035f5167f2fd5e4d2

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      90ea6f1e1b55d517eb06f56110dc4c15baa640ca320b06d65ee006856215a201d4716c424df463d8a9beb143ee7b710d17210b1703156ba1da03c9919e842484

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      16KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      73bc9e5bc8f927ef3016000d0aebc906

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      654a335670149f6a74a914c15e219d3e3837dfa4

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      7c604c2d2097adac1e0b0309a2d9f36cdbab8bba15d276b87230eea5301ceccc

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      4ee1436240c55954f9be7990f48d4c926264822b00a360294c2d9b6c17384c4855de944fe0496e04d2ee1adeaa3482b751463b882b7435cd0747bc22c1c19604

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202407160520301\additional_file0.tmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      2.6MB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      dfe86cd1ab9fe5055dba3ead830574f6

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      800ba6757bf301a918a800ce15a3853e3941e019

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      f9cdff6fea65207cde93c637cca4b92939359ede3ac7337c2048e076085e7e5f

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      d3d363a221a3fa7a010194965cb8cc7210aa17d81be094a3e8ee89bb2de684c3b874ce1c6c55e8109091a849874d05c1bae132d450dabe2597167782d0063570

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\0XJ00v4Q\KYwe49rvGiycgh7.exe

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      6.7MB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      4804a8f65e129f3c12e932520e841984

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      e1e81f264960a5f6037293a5a8edee414621619e

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      5b43642bad3a3ac02ad962bc8218538af3c062baab6f635cdb69f45c2adf34ad

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      2bd49cf1aaac6389ab78cc7fcb2b428601e75b953124c68d368fe51459bd1ae0670391fff5a58736b492d6fdbe9a6877278c2160780e7521a9caa803fc75de6a

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS024C50C9\setup.exe

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      5.2MB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      9f1b088ecc5e2f36939797060e8f5956

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      78adf95b81e539d1450c61a8d135f5f836bcd4a9

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      1caa0f7f2913218f5bcd069a52aad482396914780d89f77c6610b70b36dc1e13

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      6bd73db75e7c7493ac6e03e745385641c4eccaeb1d8e96a2b157e1d4043d42990a05edd6702f28e25d4a25d4e39295739f1a6a6ccf89e629f6010ee8ebd66212

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\EGDePcmj\KPUahvThg.exe

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      4.4MB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      bfcf6a8099e1c16e23720637b74e2621

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      928302f4795c14c1c481475122cabd36af1db2d4

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      ddee82b36825dab91ef266287694fcce8aeb12ed3bb7b1858e1cd016610a8e40

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      565f3f7c9787264a231f3e7bf7f20ea05d82c422120050f3c168ce31b5f52d7e2f1b01011c30e593bc123602fb6317499e26ef01dbaa03ef7536f14b46f3a951

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2407160520289904956.dll

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      4.7MB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      82234053e684a16ea0b40a7f208f3233

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      00381b28887a12f9ef8ee51cdbcc4320679ae88b

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      23bda6025409f7e0a044b10644f4bace9772426312a969552931291306917c23

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      be3235cc7d6ed941ced36cdc43a87ffae3b5163cacc12c2cbe6f320b6469d1c16d0bf2e42558df504d2c1a12d0234cfd187438830a59554696864a234de5f357

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_y1vjs5ff.32a.ps1

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      60B

                                                                                                                                                                                      MD5

                                                                                                                                                                                      d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\fLWUzBAt\qhXb5.exe

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      2.0MB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      792a82aaa8e27e704a930727c6caf8f4

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      f426f83d9e573e0e3b87c60a84b593763534429c

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      139a000af80e07ab2d5e75662cc49061f19a675145ca0c9cdac054651f2fc730

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      6cc840e62cf32b6adad7d7529c146b6732e83759c388b2f8d2f2210d4ff4c7b5498e2da1e40ab026c71314005bf8e8eefc64da64e012be90548901aa8a0b44f8

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-6UDEN.tmp\_isetup\_iscrypt.dll

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      2KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      a69559718ab506675e907fe49deb71e9

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-B5H7O.tmp\setup_UQNFVEhrLG.tmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      694KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      f4724063b5529d79d305fa06cde8c876

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      c3ca1d6d36ee34df1cbd0e80a49faa7fb196a108

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      3d54d2226306354e81ac6417e879979c80394236a4aa0feb58714b916d482013

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      e59576a1fb8bb57db9c793f799bb91b8814e9a111f1f6c43282f77f1329e9d2e4041487de3a31114b88218c3c4fbf56156d01a1014a64e1b2371543598cd68a6

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-LU2GI.tmp\KPUahvThg.tmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      680KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      0772dab3b71a115119373645908f8728

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      27a20f3809153980ef7a2b3f599c2683edc214aa

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      62415d7ed167e7cf2e5cc0048dc5895e3e185a9cd670ae388c573dd777c034f6

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      478bcfa6a94a4c24c4f76610dd571cfbf343d7b610b68b69f46b6a8f6a5b162ab6414bdb6ffa9b97d7f979e53cf1ab31438ac45c2a1184f6faf92aba5569fd81

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\is-TOHQI.tmp\_isetup\_shfoldr.dll

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      22KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      92dc6ef532fbb4a5c3201469a5b5eb63

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\kFI41UvV\KKiN1HZXfoqF.exe

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      298KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      a5c28707c5e04dbee7699ff8729bbfff

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      a229e4e88fad6fa382cd53f758af7579e6e10831

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      77d96b1c561454c31c8f0522934b5977cba696ab612475054039095aaa7f5513

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      cf55bab8d8b41e0024c43416ff92feff30a4711916afa1a07739591c863668ed796a4670cba694b48954d7c1922420852819f970e8dca3f0e811a7b59cd94fdf

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\nss7C5C.tmp\INetC.dll

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      21KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      92ec4dd8c0ddd8c4305ae1684ab65fb0

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      d850013d582a62e502942f0dd282cc0c29c4310e

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      5520208a33e6409c129b4ea1270771f741d95afe5b048c2a1e6a2cc2ad829934

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      581351aef694f2489e1a0977ebca55c4d7268ca167127cefb217ed0d2098136c7eb433058469449f75be82b8e5d484c9e7b6cf0b32535063709272d7810ec651

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\nss7C5C.tmp\blowfish.dll

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      22KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      5afd4a9b7e69e7c6e312b2ce4040394a

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      fbd07adb3f02f866dc3a327a86b0f319d4a94502

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      053b4487d22aacf8274bab448ae1d665fe7926102197b47bfba6c7ed5493b3ae

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      f78efe9d1fa7d2ffc731d5f878f81e4dcbfaf0c561fdfbf4c133ba2ce1366c95c4672d67cae6a8bd8fcc7d04861a9da389d98361055ac46fc9793828d9776511

                                                                                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\nss7C5C.tmp\nsProcess.dll

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      4KB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      faa7f034b38e729a983965c04cc70fc1

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      df8bda55b498976ea47d25d8a77539b049dab55e

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      579a034ff5ab9b732a318b1636c2902840f604e8e664f5b93c07a99253b3c9cf

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      7868f9b437fcf829ad993ff57995f58836ad578458994361c72ae1bf1dfb74022f9f9e948b48afd3361ed3426c4f85b4bb0d595e38ee278fee5c4425c4491dbf

                                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports\settings.dat

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      40B

                                                                                                                                                                                      MD5

                                                                                                                                                                                      7efa5392635555586145f81ea1e1cc43

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      2c5eeb15ef9885947f341b50a0ceafbcb808494b

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      5f79eed2fb61841c8bd6afa35e06ff8cedddc9d345fcad868ce56a114c93d2dd

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      eb3bf35369be9bd8160c6cae44d93357489b85a192b835d15e1e98328a6b6d518aefdee1b4c28cbb32dcd7e7fa8f3ada6dc6dc86858b65cb625b1c53975bfd8d

                                                                                                                                                                                    • C:\Users\Admin\Downloads\setup_UQNFVEhrLG.zip

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      5.8MB

                                                                                                                                                                                      MD5

                                                                                                                                                                                      5bef91e58793be9257b316907c158290

                                                                                                                                                                                      SHA1

                                                                                                                                                                                      57a73be6797f8fdc7f749fc5931d100e2e0998ca

                                                                                                                                                                                      SHA256

                                                                                                                                                                                      efc99f548c604eeba27135d27bacb08ab5dfb6ca7ad4d8d7cb861c45f2135b18

                                                                                                                                                                                      SHA512

                                                                                                                                                                                      6ae8028410819754f2a213a7aa5222489797e5c9519adfc4e336d04cb13cad1f43c5ca6323e9aa1ffc87c3c89cf295cb1106cda35df0a351df6e3926a65d7e8b

                                                                                                                                                                                    • memory/1816-384-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      756KB

                                                                                                                                                                                    • memory/1980-423-0x0000000005BA0000-0x0000000005BBE000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      120KB

                                                                                                                                                                                    • memory/1980-409-0x0000000004F00000-0x0000000005528000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      6.2MB

                                                                                                                                                                                    • memory/1980-441-0x00000000060B0000-0x00000000060CA000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      104KB

                                                                                                                                                                                    • memory/1980-408-0x0000000000E30000-0x0000000000E66000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      216KB

                                                                                                                                                                                    • memory/1980-440-0x00000000071F0000-0x000000000786A000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      6.5MB

                                                                                                                                                                                    • memory/1980-424-0x0000000005BF0000-0x0000000005C3C000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      304KB

                                                                                                                                                                                    • memory/1980-422-0x0000000005610000-0x0000000005964000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      3.3MB

                                                                                                                                                                                    • memory/1980-412-0x00000000055A0000-0x0000000005606000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      408KB

                                                                                                                                                                                    • memory/1980-410-0x0000000004BF0000-0x0000000004C12000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      136KB

                                                                                                                                                                                    • memory/1980-411-0x0000000005530000-0x0000000005596000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      408KB

                                                                                                                                                                                    • memory/3444-388-0x0000000000400000-0x0000000000CD0000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      8.8MB

                                                                                                                                                                                    • memory/3444-370-0x0000000000400000-0x0000000000CD0000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      8.8MB

                                                                                                                                                                                    • memory/3444-371-0x0000000000400000-0x0000000000CD0000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      8.8MB

                                                                                                                                                                                    • memory/3444-686-0x0000000000400000-0x0000000000CD0000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      8.8MB

                                                                                                                                                                                    • memory/3444-727-0x0000000000400000-0x0000000000CD0000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      8.8MB

                                                                                                                                                                                    • memory/3444-429-0x0000000000400000-0x0000000000CD0000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      8.8MB

                                                                                                                                                                                    • memory/3444-385-0x0000000000400000-0x0000000000CD0000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      8.8MB

                                                                                                                                                                                    • memory/3568-292-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      80KB

                                                                                                                                                                                    • memory/3568-383-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      80KB

                                                                                                                                                                                    • memory/5312-503-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      80KB

                                                                                                                                                                                    • memory/5312-687-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      80KB

                                                                                                                                                                                    • memory/5344-723-0x0000000006E70000-0x0000000006EBC000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      304KB

                                                                                                                                                                                    • memory/5372-688-0x0000000000400000-0x00000000004BA000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      744KB

                                                                                                                                                                                    • memory/5448-642-0x0000000005C00000-0x0000000005F54000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      3.3MB

                                                                                                                                                                                    • memory/5448-651-0x0000000006660000-0x00000000066AC000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      304KB

                                                                                                                                                                                    • memory/5716-572-0x0000000000400000-0x0000000000898000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      4.6MB

                                                                                                                                                                                    • memory/5716-576-0x0000000000400000-0x0000000000898000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      4.6MB

                                                                                                                                                                                    • memory/5716-574-0x0000000000400000-0x0000000000898000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      4.6MB

                                                                                                                                                                                    • memory/5784-689-0x0000000000400000-0x0000000000898000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      4.6MB

                                                                                                                                                                                    • memory/5784-578-0x0000000000400000-0x0000000000898000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      4.6MB

                                                                                                                                                                                    • memory/5784-780-0x0000000000400000-0x0000000000898000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      4.6MB

                                                                                                                                                                                    • memory/6000-594-0x0000000006540000-0x000000000658C000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      304KB

                                                                                                                                                                                    • memory/6000-592-0x0000000005EC0000-0x0000000006214000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      3.3MB

                                                                                                                                                                                    • memory/6100-692-0x0000000010000000-0x00000000105E5000-memory.dmp

                                                                                                                                                                                      Filesize

                                                                                                                                                                                      5.9MB