Analysis

  • max time kernel
    218s
  • max time network
    216s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-08-2024 00:21

General

  • Target

    https://github.com/rasea2/solara-roblox-executor/releases/download/Download/setup.zip

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 2 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 12 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 12 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 48 IoCs
  • Loads dropped DLL 64 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 6 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Checks system information in the registry 2 TTPs 16 IoCs

    System information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Detects videocard installed 1 TTPs 3 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates system info in registry 2 TTPs 12 IoCs
  • GoLang User-Agent 4 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 45 IoCs
  • Modifies registry class 64 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 38 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:2620
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3936
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:3624
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/rasea2/solara-roblox-executor/releases/download/Download/setup.zip
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3180
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf91c46f8,0x7ffdf91c4708,0x7ffdf91c4718
        2⤵
          PID:4804
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1860,8602038309101990900,15468518077309681608,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:2
          2⤵
            PID:2284
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1860,8602038309101990900,15468518077309681608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4756
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1860,8602038309101990900,15468518077309681608,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:8
            2⤵
              PID:5068
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,8602038309101990900,15468518077309681608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1
              2⤵
                PID:3508
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,8602038309101990900,15468518077309681608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
                2⤵
                  PID:4188
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1860,8602038309101990900,15468518077309681608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:8
                  2⤵
                    PID:4156
                  • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1860,8602038309101990900,15468518077309681608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:376
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,8602038309101990900,15468518077309681608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:1
                    2⤵
                      PID:4024
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1860,8602038309101990900,15468518077309681608,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5536 /prefetch:8
                      2⤵
                        PID:1572
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1860,8602038309101990900,15468518077309681608,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5756 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:4360
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,8602038309101990900,15468518077309681608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:1
                        2⤵
                          PID:2632
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,8602038309101990900,15468518077309681608,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:1
                          2⤵
                            PID:3212
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,8602038309101990900,15468518077309681608,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:1
                            2⤵
                              PID:1172
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1860,8602038309101990900,15468518077309681608,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6376 /prefetch:1
                              2⤵
                                PID:1680
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1860,8602038309101990900,15468518077309681608,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1788 /prefetch:2
                                2⤵
                                • Suspicious behavior: EnumeratesProcesses
                                PID:4416
                            • C:\Windows\System32\CompPkgSrv.exe
                              C:\Windows\System32\CompPkgSrv.exe -Embedding
                              1⤵
                                PID:4972
                              • C:\Windows\System32\CompPkgSrv.exe
                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                1⤵
                                  PID:3828
                                • C:\Windows\System32\rundll32.exe
                                  C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                  1⤵
                                    PID:4972
                                  • C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe
                                    "C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe"
                                    1⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4768
                                  • C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe
                                    "C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe"
                                    1⤵
                                    • Loads dropped DLL
                                    • Maps connected drives based on registry
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:400
                                    • C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe
                                      C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • Drops file in Program Files directory
                                      • System Location Discovery: System Language Discovery
                                      PID:1820
                                      • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\MicrosoftEdgeUpdate.exe
                                        "C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\MicrosoftEdgeUpdate.exe" /installsource taggedmi /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"
                                        3⤵
                                        • Event Triggered Execution: Image File Execution Options Injection
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Checks system information in the registry
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:2912
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          • Modifies registry class
                                          PID:3604
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          • Modifies registry class
                                          PID:4540
                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                            5⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Modifies registry class
                                            PID:2036
                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                            5⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Modifies registry class
                                            PID:4376
                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                            5⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Modifies registry class
                                            PID:4136
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTk1LjE1IiBuZXh0dmVyc2lvbj0iMS4zLjE5NS4xNSIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNTMzOTYzNTA0NCIgaW5zdGFsbF90aW1lX21zPSI5MTMiLz48L2FwcD48L3JlcXVlc3Q-
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Checks system information in the registry
                                          • System Location Discovery: System Language Discovery
                                          • System Network Configuration Discovery: Internet Connection Discovery
                                          PID:5092
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource taggedmi /sessionid "{BA7A748B-FCCE-4B18-B2C2-41F919701B49}"
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of FindShellTrayWindow
                                          PID:768
                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=LoaderV6.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=400.724.5310495286963122528
                                      2⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Checks system information in the registry
                                      • Enumerates system info in registry
                                      • Modifies data under HKEY_USERS
                                      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                      • System policy modification
                                      PID:2128
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=127.0.2651.86 --initial-client-data=0x16c,0x170,0x174,0x148,0x78,0x7ffdf533d198,0x7ffdf533d1a4,0x7ffdf533d1b0
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:624
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --webview-exe-name=LoaderV6.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1844,i,9775874451472743896,11589380022894228039,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1816 /prefetch:2
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:4064
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --webview-exe-name=LoaderV6.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1876,i,9775874451472743896,11589380022894228039,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2040 /prefetch:3
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:532
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --webview-exe-name=LoaderV6.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1708,i,9775874451472743896,11589380022894228039,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2256 /prefetch:8
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:3272
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --webview-exe-name=LoaderV6.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3564,i,9775874451472743896,11589380022894228039,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3572 /prefetch:1
                                        3⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:1892
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --webview-exe-name=LoaderV6.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=4640,i,9775874451472743896,11589380022894228039,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4656 /prefetch:1
                                        3⤵
                                        • Checks computer location settings
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        PID:4508
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe\""
                                      2⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:1156
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe
                                        3⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4088
                                    • C:\Windows\System32\Wbem\wmic.exe
                                      wmic path win32_VideoController get name
                                      2⤵
                                      • Detects videocard installed
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2324
                                    • C:\Windows\system32\tasklist.exe
                                      tasklist
                                      2⤵
                                      • Enumerates processes with tasklist
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3172
                                    • C:\Windows\System32\Wbem\wmic.exe
                                      wmic csproduct get uuid
                                      2⤵
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:4304
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks /create /tn WinHost /tr C:\ProgramData\Microsoft\WinHost.exe /sc onstart /ru SYSTEM
                                      2⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:3556
                                    • C:\ProgramData\driver1.exe
                                      C:\ProgramData\driver1.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetThreadContext
                                      PID:4284
                                      • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                        C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                        3⤵
                                        • Suspicious use of NtCreateUserProcessOtherParentProcess
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:752
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 752 -s 428
                                          4⤵
                                          • Program crash
                                          PID:1048
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 752 -s 456
                                          4⤵
                                          • Program crash
                                          PID:4284
                                    • C:\Windows\system32\schtasks.exe
                                      schtasks /create /tn WinDriver /tr C:\ProgramData\Microsoft\WinDriver.exe /sc onstart /ru SYSTEM
                                      2⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:2864
                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
                                    1⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Checks system information in the registry
                                    • Drops file in Program Files directory
                                    • System Location Discovery: System Language Discovery
                                    • Modifies data under HKEY_USERS
                                    PID:4548
                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI1IiBpbnN0YWxsZGF0ZXRpbWU9IjE3MjI2MDI3MTMiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM2NzA3NTI3MDAxNDkzNzQiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTE0MzI1IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzQ1NzE1NjkwIi8-PC9hcHA-PC9yZXF1ZXN0Pg
                                      2⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Checks system information in the registry
                                      • System Location Discovery: System Language Discovery
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      PID:3624
                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{8876C608-538B-4BB9-9CE1-69E2A93D3F27}\MicrosoftEdge_X64_127.0.2651.86.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{8876C608-538B-4BB9-9CE1-69E2A93D3F27}\MicrosoftEdge_X64_127.0.2651.86.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
                                      2⤵
                                      • Executes dropped EXE
                                      • Drops file in Program Files directory
                                      PID:3688
                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{8876C608-538B-4BB9-9CE1-69E2A93D3F27}\EDGEMITMP_E428B.tmp\setup.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{8876C608-538B-4BB9-9CE1-69E2A93D3F27}\EDGEMITMP_E428B.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{8876C608-538B-4BB9-9CE1-69E2A93D3F27}\MicrosoftEdge_X64_127.0.2651.86.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
                                        3⤵
                                        • Executes dropped EXE
                                        • Drops file in Program Files directory
                                        PID:4108
                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{8876C608-538B-4BB9-9CE1-69E2A93D3F27}\EDGEMITMP_E428B.tmp\setup.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{8876C608-538B-4BB9-9CE1-69E2A93D3F27}\EDGEMITMP_E428B.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{8876C608-538B-4BB9-9CE1-69E2A93D3F27}\EDGEMITMP_E428B.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.86 --initial-client-data=0x22c,0x230,0x234,0x208,0x238,0x7ff601f4b7d0,0x7ff601f4b7dc,0x7ff601f4b7e8
                                          4⤵
                                          • Executes dropped EXE
                                          PID:5028
                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMTkwNDEuMTI4OCIgc3A9IiIgYXJjaD0ieDY0IiBwcm9kdWN0X3R5cGU9IjQ4IiBpc193aXA9IjAiIGlzX2luX2xvY2tkb3duX21vZGU9IjAiLz48b2VtIHByb2R1Y3RfbWFudWZhY3R1cmVyPSIiIHByb2R1Y3RfbmFtZT0iIi8-PGV4cCBldGFnPSImcXVvdDtWUFFvUDFGK2ZxMTV3UnpoMWtQTDRQTXBXaDhPUk1CNWl6dnJPQy9jaGpRPSZxdW90OyIvPjxhcHAgYXBwaWQ9IntGMzAxNzIyNi1GRTJBLTQyOTUtOEJERi0wMEMzQTlBN0U0QzV9IiB2ZXJzaW9uPSIiIG5leHR2ZXJzaW9uPSIxMjcuMC4yNjUxLjg2IiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIiBleHBlcmltZW50cz0iY29uc2VudD1mYWxzZSIgaW5zdGFsbGFnZT0iLTEiIGluc3RhbGxkYXRlPSItMSI-PHVwZGF0ZWNoZWNrLz48ZXZlbnQgZXZlbnR0eXBlPSI5IiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzU1NzE1MTQ4IiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIi8-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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzU3IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI2MTk3MDA3OTI5IiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iNDA2IiBkb3dubG9hZF90aW1lX21zPSIzOTAzNCIgZG93bmxvYWRlZD0iMTcyNTY3MTA0IiB0b3RhbD0iMTcyNTY3MTA0IiBwYWNrYWdlX2NhY2hlX3Jlc3VsdD0iMCIgaW5zdGFsbF90aW1lX21zPSI0MzcwMiIvPjwvYXBwPjwvcmVxdWVzdD4
                                      2⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Checks system information in the registry
                                      • System Location Discovery: System Language Discovery
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      PID:4864
                                  • C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe
                                    "C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe"
                                    1⤵
                                    • Loads dropped DLL
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:3528
                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=LoaderV6.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=3528.5008.17684364221198175073
                                      2⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:1072
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 752 -ip 752
                                    1⤵
                                      PID:3564
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 752 -ip 752
                                      1⤵
                                        PID:3276
                                      • C:\Windows\system32\OpenWith.exe
                                        C:\Windows\system32\OpenWith.exe -Embedding
                                        1⤵
                                        • Suspicious use of SetWindowsHookEx
                                        PID:5580
                                      • C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe
                                        "C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe"
                                        1⤵
                                        • Loads dropped DLL
                                        • Maps connected drives based on registry
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:5664
                                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=LoaderV6.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=5664.5704.17877064684844075475
                                          2⤵
                                          • Checks computer location settings
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Checks system information in the registry
                                          • Enumerates system info in registry
                                          • Modifies data under HKEY_USERS
                                          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                          • System policy modification
                                          PID:5708
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=127.0.2651.86 --initial-client-data=0x160,0x164,0x168,0x13c,0x19c,0x7ffdf533d198,0x7ffdf533d1a4,0x7ffdf533d1b0
                                            3⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:5732
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --webview-exe-name=LoaderV6.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1800,i,14866032079073252026,11495313175179406866,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1796 /prefetch:2
                                            3⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:5956
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --webview-exe-name=LoaderV6.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1844,i,14866032079073252026,11495313175179406866,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1860 /prefetch:3
                                            3⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:5972
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --webview-exe-name=LoaderV6.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2324,i,14866032079073252026,11495313175179406866,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2220 /prefetch:8
                                            3⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:6008
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --webview-exe-name=LoaderV6.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3572,i,14866032079073252026,11495313175179406866,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3740 /prefetch:1
                                            3⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:724
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --webview-exe-name=LoaderV6.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=4580,i,14866032079073252026,11495313175179406866,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4608 /prefetch:1
                                            3⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            PID:4136
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --webview-exe-name=LoaderV6.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=4564,i,14866032079073252026,11495313175179406866,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4680 /prefetch:1
                                            3⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            PID:6060
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --webview-exe-name=LoaderV6.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=4680,i,14866032079073252026,11495313175179406866,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4596 /prefetch:1
                                            3⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            PID:5060
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe\""
                                          2⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:5212
                                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe
                                            3⤵
                                            • Command and Scripting Interpreter: PowerShell
                                            • Suspicious behavior: EnumeratesProcesses
                                            PID:1576
                                        • C:\Windows\System32\Wbem\wmic.exe
                                          wmic path win32_VideoController get name
                                          2⤵
                                          • Detects videocard installed
                                          PID:3032
                                        • C:\Windows\system32\tasklist.exe
                                          tasklist
                                          2⤵
                                          • Enumerates processes with tasklist
                                          PID:5420
                                        • C:\Windows\System32\Wbem\wmic.exe
                                          wmic csproduct get uuid
                                          2⤵
                                            PID:1836
                                          • C:\ProgramData\driver1.exe
                                            C:\ProgramData\driver1.exe
                                            2⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetThreadContext
                                            PID:2776
                                            • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                              C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                              3⤵
                                              • Suspicious use of NtCreateUserProcessOtherParentProcess
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:776
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 432
                                                4⤵
                                                • Program crash
                                                PID:5420
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 776 -s 428
                                                4⤵
                                                • Program crash
                                                PID:5476
                                        • C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe
                                          "C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe"
                                          1⤵
                                          • Loads dropped DLL
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:5088
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=LoaderV6.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=5088.4340.12510379586174370673
                                            2⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            PID:4660
                                            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=127.0.2651.86 --initial-client-data=0x160,0x164,0x168,0x13c,0x170,0x7ffdf533d198,0x7ffdf533d1a4,0x7ffdf533d1b0
                                              3⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              PID:4796
                                        • C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe
                                          "C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe"
                                          1⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:2016
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=LoaderV6.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=2016.5588.429669224933428282
                                            2⤵
                                            • Executes dropped EXE
                                            PID:5600
                                            • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                              "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=127.0.2651.86 --initial-client-data=0x160,0x164,0x168,0x13c,0x170,0x7ffdf533d198,0x7ffdf533d1a4,0x7ffdf533d1b0
                                              3⤵
                                              • Executes dropped EXE
                                              PID:1580
                                        • C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe
                                          "C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe"
                                          1⤵
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:5288
                                          • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                            "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=LoaderV6.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=5288.5400.11038657139279432314
                                            2⤵
                                            • Executes dropped EXE
                                            PID:5404
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 776 -ip 776
                                          1⤵
                                            PID:3416
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 776 -ip 776
                                            1⤵
                                              PID:5484
                                            • C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe
                                              "C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe"
                                              1⤵
                                              • Maps connected drives based on registry
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:328
                                              • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                                "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=LoaderV6.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=328.5584.7749398179136233320
                                                2⤵
                                                • Checks computer location settings
                                                • Executes dropped EXE
                                                • Checks system information in the registry
                                                • Enumerates system info in registry
                                                • Modifies data under HKEY_USERS
                                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                                • System policy modification
                                                PID:5604
                                                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=127.0.2651.86 --initial-client-data=0x164,0x168,0x16c,0x140,0xf4,0x7ffdf533d198,0x7ffdf533d1a4,0x7ffdf533d1b0
                                                  3⤵
                                                  • Executes dropped EXE
                                                  PID:5924
                                                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --webview-exe-name=LoaderV6.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1816,i,7082573299314159300,14369781299809293890,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1812 /prefetch:2
                                                  3⤵
                                                  • Executes dropped EXE
                                                  PID:1672
                                                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --webview-exe-name=LoaderV6.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2064,i,7082573299314159300,14369781299809293890,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2056 /prefetch:3
                                                  3⤵
                                                  • Executes dropped EXE
                                                  PID:4952
                                                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --webview-exe-name=LoaderV6.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2128,i,7082573299314159300,14369781299809293890,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2276 /prefetch:8
                                                  3⤵
                                                  • Executes dropped EXE
                                                  PID:3232
                                                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --webview-exe-name=LoaderV6.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3616,i,7082573299314159300,14369781299809293890,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3796 /prefetch:1
                                                  3⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  PID:5356
                                                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --webview-exe-name=LoaderV6.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=4056,i,7082573299314159300,14369781299809293890,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3828 /prefetch:1
                                                  3⤵
                                                  • Checks computer location settings
                                                  • Executes dropped EXE
                                                  PID:632
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe\""
                                                2⤵
                                                • Command and Scripting Interpreter: PowerShell
                                                PID:640
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe
                                                  3⤵
                                                  • Command and Scripting Interpreter: PowerShell
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:5472
                                              • C:\Windows\System32\Wbem\wmic.exe
                                                wmic path win32_VideoController get name
                                                2⤵
                                                • Detects videocard installed
                                                PID:3048
                                              • C:\Windows\system32\tasklist.exe
                                                tasklist
                                                2⤵
                                                • Enumerates processes with tasklist
                                                PID:4132
                                              • C:\Windows\System32\Wbem\wmic.exe
                                                wmic csproduct get uuid
                                                2⤵
                                                  PID:4212
                                              • C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe
                                                "C:\Users\Admin\Downloads\setup\loaderV6\LoaderV6.exe"
                                                1⤵
                                                • Suspicious behavior: EnumeratesProcesses
                                                PID:5544
                                                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=LoaderV6.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=5544.668.13596961189216479578
                                                  2⤵
                                                  • Executes dropped EXE
                                                  PID:6100
                                                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe
                                                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.86\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=127.0.2651.86 --initial-client-data=0x160,0x164,0x168,0x13c,0x170,0x7ffdf533d198,0x7ffdf533d1a4,0x7ffdf533d1b0
                                                    3⤵
                                                    • Executes dropped EXE
                                                    PID:768

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.86\Installer\setup.exe

                                                Filesize

                                                6.6MB

                                                MD5

                                                71bf4a76d1762959b49eda173f57656e

                                                SHA1

                                                2ead7f36b7ef2790d83d10d96b20959bf73d061d

                                                SHA256

                                                0121c1dde7daaacfd974fc8545a029e970ad7769af84646feff41b7c8c2de33e

                                                SHA512

                                                05ea34097e98e4df5358a2968e4af9c7157c1946b15787d5c3cb1c841d47db6cacda4135a0fc662c2dae0b8ad03bdcfa1015db745c39bb16068df0108bda717e

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\EdgeUpdate.dat

                                                Filesize

                                                12KB

                                                MD5

                                                369bbc37cff290adb8963dc5e518b9b8

                                                SHA1

                                                de0ef569f7ef55032e4b18d3a03542cc2bbac191

                                                SHA256

                                                3d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3

                                                SHA512

                                                4f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\MicrosoftEdgeComRegisterShellARM64.exe

                                                Filesize

                                                182KB

                                                MD5

                                                b69894fc1c3f26c77b1826ef8b5a9fc5

                                                SHA1

                                                cff7b4299253beda53fb015408dd840db59901a1

                                                SHA256

                                                b91bad4c618eb6049b19364f62827470095e30519d07f4e0f2ccc387ddd5f1bf

                                                SHA512

                                                8361e97d84082f8e888262d0657bac47c152bd72f972628f446f58cbeacf37c05f484dce3fb0d38c4f0da2a2dcbb0813639d201d127ec7f072b942d43b216755

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\MicrosoftEdgeUpdate.exe

                                                Filesize

                                                201KB

                                                MD5

                                                136e8226d68856da40a4f60e70581b72

                                                SHA1

                                                6c1a09e12e3e07740feef7b209f673b06542ab62

                                                SHA256

                                                b4b8a2f87ee9c5f731189fe9f622cb9cd18fa3d55b0e8e0ae3c3a44a0833709f

                                                SHA512

                                                9a0215830e3f3a97e8b2cdcf1b98053ce266f0c6cb537942aec1f40e22627b60cb5bb499faece768481c41f7d851fcd5e10baa9534df25c419664407c6e5a399

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\MicrosoftEdgeUpdateComRegisterShell64.exe

                                                Filesize

                                                215KB

                                                MD5

                                                205590d4fb4b1914d2853ab7a9839ccf

                                                SHA1

                                                d9bbf8941df5993f72ffcf46beefcfcd88694ebd

                                                SHA256

                                                5f82471d58b6e700248d9602ce4a0a5cda4d2e2863ef1eb9fee4effcc07f3767

                                                SHA512

                                                bce1447d5d3210c22d52dec3b846db091b65ed03fd9d7cd11c6c4dbd2aa5a943d881360bc033c29abd61011581ff9354b35cbe421719d92568ed99997bfbbae8

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\MicrosoftEdgeUpdateCore.exe

                                                Filesize

                                                261KB

                                                MD5

                                                b07ab49ee8453853021c7dac2b2131db

                                                SHA1

                                                e1d87d6a6e7503d0d2b288ea5f034fe2f346196a

                                                SHA256

                                                f8535d5d73ebebed15adc6ae2ced6bb4889aa23e6ffe55faeabd961bf77b05e4

                                                SHA512

                                                5eaae533fbe71430ae2a717f7668fd0a26ec37624e198a32f09bfdbee7e3b6e93d64e4fbb78cbdb05c4fe390a864490ea997d11849ecd371f5153bc8bfafccc3

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\NOTICE.TXT

                                                Filesize

                                                4KB

                                                MD5

                                                6dd5bf0743f2366a0bdd37e302783bcd

                                                SHA1

                                                e5ff6e044c40c02b1fc78304804fe1f993fed2e6

                                                SHA256

                                                91d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5

                                                SHA512

                                                f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdate.dll

                                                Filesize

                                                2.1MB

                                                MD5

                                                5d89123f9b96098d8fad74108bdd5f7e

                                                SHA1

                                                6309551b9656527563d2b2f3c335fd6805da0501

                                                SHA256

                                                03c3c918886e58f096aa8e919b1e9f8dcd5a9f2a4765971049bf8da305476f44

                                                SHA512

                                                9d8190e5374cd1b4adbbfb87c27fa40d4de529d7c0a20654e0ce189a4cb9a53d3708c4ce657a7a5469b015df7efbbff495fc844579d9cd363b329b7e007e85c8

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_af.dll

                                                Filesize

                                                29KB

                                                MD5

                                                4f860d5995ab77e6efa8f589a758c6d2

                                                SHA1

                                                07536839ccfd3c654ec5dc2161020f729973196d

                                                SHA256

                                                9841d787142dd54fea6b033bd897f05f3e617b48b051de0ee3cf5865b3393150

                                                SHA512

                                                0b9a661b76360f1fb2eb3ee25c6bf2cbab7ec74e2363e0af321dc4d0afb3cad301dddd16ea367d588451a40a2c2ed41f21d7afae48307e1e4a4ec5b24165b378

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_am.dll

                                                Filesize

                                                24KB

                                                MD5

                                                f624de37750fd191eb29d4de36818f8b

                                                SHA1

                                                b647dae9b9a3c673980afa651d73ce0a4985aae6

                                                SHA256

                                                e284453cd512e446fcbf9440013f8cb2348ffd6b1acec5366f2511cdf88b1794

                                                SHA512

                                                d1d65e29ed59e34d4ff66df11a2368f1a724730e32eb245022d4f3d1fadf16d445ba8532460afb0e6e91f8be60a7240d13577403193042d1e912a67e4bf23b1a

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_ar.dll

                                                Filesize

                                                26KB

                                                MD5

                                                5de3f4dabb5f033f24e29033142e7349

                                                SHA1

                                                5c446985de443501b545d75f6886a143c748b033

                                                SHA256

                                                2533d443b68c5288468b0b20cc3a70dc05f0498369d5321368a97dd5bf3268c8

                                                SHA512

                                                c96296e6f67edeff2be5dc03014a8eb65fc287fb899357d4608c36c07b4610827aa18cbec6ccd47b66230a12341af488aca8bd02632fa768f84ca7b1d9c9d065

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_as.dll

                                                Filesize

                                                29KB

                                                MD5

                                                1fb14c6c4fee7bfabe41badb7c5acff8

                                                SHA1

                                                953d94cd73951943db14c08cce37b2d3ac821b02

                                                SHA256

                                                cd32339fd7e4a5959e93eb5bfd6e009e4137e15c5e6c2e861d7891487216da49

                                                SHA512

                                                a93b081935fbe48fafa8071a9cd593ae7b19205c70eaf48c724397019a04161460c66d6d8c6ffd872f4d52a4a7aa25ba1cba04181b9ebaca04b76d111ea588d2

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_az.dll

                                                Filesize

                                                29KB

                                                MD5

                                                d3345579310f3bd080b406de47b2305f

                                                SHA1

                                                16aefb27ea6d81c684f041aa50ebb49fdd403d83

                                                SHA256

                                                b4ea3c63fa0104093a2b2034f950428e66d2cf3d55f0fc5bd688483392d60d69

                                                SHA512

                                                65e4aa8587bc579b5109d91e02745f6de96a23b6ac2962cdeb6d9d536b51abab12b2bbaeca72572c3ae1971dac5bd24430eb2ae5ccf44a7068427594e4afdd7a

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_bg.dll

                                                Filesize

                                                29KB

                                                MD5

                                                ecf3405e9e712d685ef1e8a5377296ea

                                                SHA1

                                                9872cdf450adf4257d77282a39b75822ce1c8375

                                                SHA256

                                                e400415638a7b7dcc28b14a257a28e93e423c396e89a02cba51623fdfbdc6b0b

                                                SHA512

                                                37e5f1b3bdd97a4370718dc2a46d78ab5b66865d3cdb66a20a7dc20a9d423ccde954c08f97e574fbab24e8dfa905351cbfb94bd3e6692a9b6526097ea3dc911d

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_bn-IN.dll

                                                Filesize

                                                29KB

                                                MD5

                                                051c429fa2beec9c2842c403a86c0e7b

                                                SHA1

                                                0a06a45200a1f5c81c48fbd2d03549fc9fac3a58

                                                SHA256

                                                1a8465922bbb05a97a24f6c2200fcc7afd8bd0ace245c2eda9d9d335d4fb9353

                                                SHA512

                                                bb59b41804328f27ba8861af32824266ca69ddcfdaaa11551b1edd4e129dbba630da8070abedb28e180045f8d0ddc1209cd901919f6b9aa421c457188af795c6

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_bn.dll

                                                Filesize

                                                29KB

                                                MD5

                                                82711e45d2b0764997abc1e0678a73bb

                                                SHA1

                                                47908e8885c86477a6f52eea5fddb005ec5b3fa3

                                                SHA256

                                                2bb7455999b8f53a2a0834588ca4da4703f4da362a127d01cc6bd60ca0303799

                                                SHA512

                                                4b517796edc954ab7f5a26a5d6605925dc7e84b611bcf59352b3b95f719cedc72c77a465fb1e7bc2d2f422d596c97968dac5b57292c82967d5cfaff980128fc2

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_bs.dll

                                                Filesize

                                                28KB

                                                MD5

                                                a0a1f791984f1de2f03a36171232d18d

                                                SHA1

                                                71f69d8fe47640ba9705725d7d627a05519c8016

                                                SHA256

                                                d2c7da8f4745b81874a9666c7d10a779a9956b4de0ebdaa1647bf78d4e17d85a

                                                SHA512

                                                a4267911846cd55eb91227b0117ccbfdf8ef6c4ed0b8935b08e5d41a91aeabd9259988c71da8606cfb2876c4d69df6ca5a246687440283f1625105624305eb33

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_ca-Es-VALENCIA.dll

                                                Filesize

                                                30KB

                                                MD5

                                                897712b508931dab76d39b209611740c

                                                SHA1

                                                9d80e07c2dc744e2efce3b67aa9876949fb9edfe

                                                SHA256

                                                ee64fdefdb3381ce61fc445190cc44b015e7b65a3a16d28f3477f68de6079f1b

                                                SHA512

                                                3329e37318dd9b11f282301e453af106168d3d10beff1ed62ffdcda60c6b4edb6b9c69ac6b9bb8abce3c9a9686a0152404524012dbff025e571de2cfcb3b5d56

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_ca.dll

                                                Filesize

                                                30KB

                                                MD5

                                                e90155442b28008992a7d899ca730222

                                                SHA1

                                                1d448e9709de0d301ded6d75caaeba4348a4793d

                                                SHA256

                                                6ae98b5e2eda22a0236434b7e952d732e3cd5d9cae2e51cd70222f1fd5278563

                                                SHA512

                                                a91d8357ca976db2eb5a081077304a50edc1b55b2775c00cfde05e03831f98bd04e43f0dba5b3efd5a6370afcb10b23bbf307412467502e9ef57e0beae636013

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_cs.dll

                                                Filesize

                                                28KB

                                                MD5

                                                1de961b662a374c3af918c18225f4364

                                                SHA1

                                                e8f1c438e57b322f43b4b851698bf38c129eb6ae

                                                SHA256

                                                bb1365c5770dacbb918af27b47b02f269504f4d2396cf3f82bf5ecb2551c5021

                                                SHA512

                                                c6bf62b684039f62744f1aab07f4751948e0c175f7fb7fe126f20903ce23fcdd2e284f1b794922621dae7eaa15c6dae0177ad102289a18f967721486f21073a1

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_cy.dll

                                                Filesize

                                                28KB

                                                MD5

                                                29f027d2d5fd486bdc20386ace925603

                                                SHA1

                                                66b8605f23871b4a8302bef0aaccb36ee1e72755

                                                SHA256

                                                03c8566f749e8fa349d97101849bc3b2cc0b7561b565a2b0928bf8fe901da813

                                                SHA512

                                                3348bdf10b2d964b34b791a774e28c97d3caf28d7f90e36b948cc2cb6c21e84cda933b7ddbd51c8fc604a450361cb834322c15ddbe0f4851154d05e5a2a2ea42

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_da.dll

                                                Filesize

                                                28KB

                                                MD5

                                                b0ae9aa0d5c17ee7abfc57d21cdcbae6

                                                SHA1

                                                01019eb6ba9c123be528136e12192b0bb33df407

                                                SHA256

                                                d10938919e3d28d71e8e3ba2d8e02e0f9dc2faf148cdedc21c166fd994c603e2

                                                SHA512

                                                4cba25c8159df865231b08fe650eedfb92d54c3037d28b2b9af010c8a59fa23669041a6c393622fe69b0194c2532f71f02b740f7e26e0bbf7ef34a421d6747b8

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_de.dll

                                                Filesize

                                                30KB

                                                MD5

                                                ad5b530eabff0540078c5d17f27b9610

                                                SHA1

                                                7e53dbbf64e70e561d37669e69f50eb0da8e37d1

                                                SHA256

                                                49f512316a51e51027b4e70de4ffe8c8ecb188e126439a90a5d12d52a0393966

                                                SHA512

                                                e1cc853d96589220676d39d91d4108633ce56304640f770e7d22b97a9b3be9452d5fb94e4e7fcd1400b62f0c398da8255c53a31853194a9e7b7784982b5ff40f

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_el.dll

                                                Filesize

                                                30KB

                                                MD5

                                                a7e64339a5314e3576c0d170171fa52a

                                                SHA1

                                                6c12aab6c97c30aff3245b78f7a3afeea604215e

                                                SHA256

                                                4e9ccecb8e4383395f2134347fbad00521345ec9c857d8fa102d5257c7bea9bf

                                                SHA512

                                                a4ca3fb60a7f4bda50847544dd1289d750f0d4b3565929290a8392b92822ef1856cec15a1f63f2c6fe1ef2e7cc0936a35bdb38ee5d904eb08cd32f05addc6ee4

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_en-GB.dll

                                                Filesize

                                                27KB

                                                MD5

                                                74d4cf3b8efb6cc3d0acc3eac38bd5b7

                                                SHA1

                                                9337803aadad9042c895b6f418b4c733b81221e0

                                                SHA256

                                                b83c8981d8835e4c78250bf265faa6d64693204b77764c8e349abc4365ae9871

                                                SHA512

                                                e6112ef60d56101aa16327042162d6ef43519bc56668ca8eaa7fd3e1aaadc75c7df75c1e41583a292ff1a9bdc7d9ad9f5c0d97fa84964532dca2d5f3df604c23

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_en.dll

                                                Filesize

                                                27KB

                                                MD5

                                                19dc1f6d1f309eb7abf1e0c8257f41f8

                                                SHA1

                                                e2d3e86fe22c6af6b8ee5b359315dfa6ac4d52ec

                                                SHA256

                                                046f6c532fcabd969c6e63bb7ee0d7a83d806fa659006508e1c3a9485190d6ef

                                                SHA512

                                                478d6a84452cfadc48547930e336ad459eec188dd3d9e4c778cded4ec3d34e00b2b8c0538366aa644ee67f878b29c5c73444c1406c66e8394761bb0979c6483c

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_es-419.dll

                                                Filesize

                                                29KB

                                                MD5

                                                8f7f515d78d2df371993fd70f863ab8d

                                                SHA1

                                                dfae1b47e80f91abf2d9c2aac009c0a1767bc59d

                                                SHA256

                                                ba57fbb9d3a32b84d6a76054b9ad180b6510e53206b9804bb9ea18ff73c2ae3e

                                                SHA512

                                                308a62af00a4410551eac967bb9f2cea7adf7c13b471dd28b276bda40b1e4c0b4ebb60aec29b6165069d40180bc45b4f5da5baddc374ce7bc5a5bb223afb4e96

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_es.dll

                                                Filesize

                                                29KB

                                                MD5

                                                6af05d448c842027f876e93f8ac58b65

                                                SHA1

                                                f34c988e3875a1d1b267b082476fcfb8d7505a73

                                                SHA256

                                                36876b14a214cf98dda5100a7e7134d7ebb78e895535d6bd7562099574607867

                                                SHA512

                                                412031db59de0367a102a026f73072244b33d726adc5bb9fd079db3dd37b5d6a24d7420a9811576d0a356933b5ba15cc9e2a92046d2d6e6d6fef37e9d840aec6

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_et.dll

                                                Filesize

                                                28KB

                                                MD5

                                                ae9bdf6416c3630c4b0b5b119308a135

                                                SHA1

                                                d7218c677b098d2a93cc91ead39c83d3a2c653b6

                                                SHA256

                                                62da90c9417a70632aa190fecc17c31ecf433c1f84f82b08d7d7290669cabf32

                                                SHA512

                                                4333ac6cd3737f25e6e1d429b195da781ced4340b89808cbd5d5d2aae2e79bcc700419d613123d632252e31ac44d95b7718f23da5b82ab5054407e80106a64a7

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_eu.dll

                                                Filesize

                                                28KB

                                                MD5

                                                fe73dbc305da6223d1e94e1cf548c000

                                                SHA1

                                                b16f2c40d68cd9718eaaa9b6db9c8e5c4b6acb9e

                                                SHA256

                                                1ef64088a613a4e10b4cf4206f95f5414ee27872798747234a6574b7e5c70a7d

                                                SHA512

                                                d9900720d89defffa52198dbe63515995095c94aa0cbbe4f32a1c09d26809cec480e92926d2240702604b8c13fcdc0032cc46910ade8e4c1d2fc9a4bd1b63858

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_fa.dll

                                                Filesize

                                                28KB

                                                MD5

                                                367ea715e942c81dd3cb734274969a0b

                                                SHA1

                                                f92f1ec2a5be9b775e67c4252a07c37ed0ca508b

                                                SHA256

                                                082da1c09782c026c9cd73456dc12539a226f0bf5d113e59bc93b29c1e98b37c

                                                SHA512

                                                c94e787ba3bdb56d1827a0477461cbba6b7cc68986722275e0d04ea7dc70db83b5d03887eec810bf9b67f70b18bd3c7b7d28f0e554938b81d3501bc11f97830a

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_fi.dll

                                                Filesize

                                                28KB

                                                MD5

                                                5a30bc4216af48a493eeb0f3a9f02607

                                                SHA1

                                                2fdf65a4002d91818d56a23fb8bfd08ab715002f

                                                SHA256

                                                5131c23915ad6b5b469bcbff31d0ae31ef34ded28ca0ffff9f1eb998bba98aa1

                                                SHA512

                                                34b3a4865f31ebdb8665780011b384ada768a0f71bff77f91706b140eb8cc07fff8787f710cdb1ee14a449cae8f22ee5fddadcc501cf1c921eea078e97dc2f89

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_fil.dll

                                                Filesize

                                                29KB

                                                MD5

                                                84c4736cf301b93998028ed7678caec1

                                                SHA1

                                                3b6f1f6b9eb3dd7d9a13c11dfd3ac56c93f1b10f

                                                SHA256

                                                3c8dcb7e982dac3159298009a86909b1e1000ccf6f4d333341f16d4d6fbd84ad

                                                SHA512

                                                5a1b77ef9450c32802e94e473a5b4e43e892c923ef368ee9bbbbb5b0090429320263cc79a4da0b281930c1a60861519211abd0bd67a9d9ee370bdda2230d2e81

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_fr-CA.dll

                                                Filesize

                                                30KB

                                                MD5

                                                8993c0784111fc7cd6a90a82303e5f44

                                                SHA1

                                                8d1ff2fed98ebc608604c555ceb46ca628afb285

                                                SHA256

                                                3d0ba88267018f592141ea86592757cf1ecaac1a3a18f99203e0fc5c5eacbd62

                                                SHA512

                                                124d16d848dc8ea0a93b292b10ce1fbad23b56b13771d904cf14c19d54478614d214441b05f6cd9e1999b8310fdd26d1c6ecae784be00aecee7e80c96ba4ac88

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_fr.dll

                                                Filesize

                                                30KB

                                                MD5

                                                a640aa4ff33662e06a474765df0b2a8d

                                                SHA1

                                                c6265225532e389e48c6057bd717b69de2125b61

                                                SHA256

                                                078b1943bf7f7955b90abc40f691b27e04376f8c43dd3abc4791614286cd4f23

                                                SHA512

                                                59791eef021f94efd9c18737d6c46fbc45add582eec92d5b997cfd66993abc7da872720a037766c3c70862f0654ccf30d122d4a5a6b305151bf8bf1c053a466d

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_ga.dll

                                                Filesize

                                                29KB

                                                MD5

                                                5bcc643a969559317d09a9c87f53d04e

                                                SHA1

                                                3602d51cde97de16d8c018225a39d505c803e0fc

                                                SHA256

                                                b48f57e90ea9db6d6a296c01e87f8db71e47ab05ab6c2a664cfa9f52cf1d2c18

                                                SHA512

                                                4c65772f77e61e64d572df5b1f62733aceb02a5c967c296b303ff17c5d49831e5b7fc3d662724ae3ae1e88cd0fdcb704e838af5d4ae20f2d82b9577f57159159

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_gd.dll

                                                Filesize

                                                30KB

                                                MD5

                                                aea23f526ef0c5bb3d2f8fdf192a49ea

                                                SHA1

                                                4d7695e33ed43c3efb95f304e29675ea885b2939

                                                SHA256

                                                3cfe866c151a7e8a208af725c0c6f2a47fc3ada35f9ad3509b16b8d5229318b9

                                                SHA512

                                                412e4742ebd46ce38010b4f6a46d8d524025f929ab4658040e271d768e79115d90903403b2f1e51ab910bbdf9677b49439eb3c8afc5959477af198efb0c7c3c9

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_gl.dll

                                                Filesize

                                                29KB

                                                MD5

                                                295cd30c00f43d9131621baf4859578f

                                                SHA1

                                                cab79a6263b7b0a799461f3e6df41f815029cded

                                                SHA256

                                                b851c5a60cb6d1e8dd9aa161106cba99ccea047d0b39d007beaa7b9ef4a83397

                                                SHA512

                                                5f5c1e62e6c0e11a63fad68928765e3f504f33cdbb1d9a05cd53cbc3ed145bf3528960a10e3d57e8c83b07c030c72257f403b9a57d12975d3ef8bc255418ad6c

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_gu.dll

                                                Filesize

                                                28KB

                                                MD5

                                                c43c1ab37cd93e54068443bc330fb3d2

                                                SHA1

                                                ab51a2cbc51b3c17cf184c6d99ac480c02eb63af

                                                SHA256

                                                0c26a367355e766402c31fbab102dd1c35300d4a1301417c75be5fc4b3d54680

                                                SHA512

                                                ff0193189fb846eb3c4188bb599dad8e6f415ec9612da567d95c9c513defb148b6013208371798d174569b46f443a744e4e8b83aaf139d68c31f7de0f94e63f9

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_hi.dll

                                                Filesize

                                                29KB

                                                MD5

                                                a5544f517f7c1bfd1ec6a2e355d5a84c

                                                SHA1

                                                34a2a4a576300ad55b6757171bcba0fab005daa5

                                                SHA256

                                                8274c64bb778b55d912929625cd849adfe733b2dd674d94895d53af8dfaabeca

                                                SHA512

                                                9069bcfb736e13499250844dddef40e2cf64937e33ee1f81fc4968f024f7d7b89c6a778866bf1bff98d770686569e4752a473c0adfad4d4099cceda84da3cac3

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_hr.dll

                                                Filesize

                                                29KB

                                                MD5

                                                c09876a180731c172fa2532f8be90a3d

                                                SHA1

                                                4359c7840ddb23142a40aff85129b9920360e954

                                                SHA256

                                                50fd548ea12e2b72fc563bc082b870a89a523e8b3a4a0e9b65fe673384da2b58

                                                SHA512

                                                91cee1b10fc12a01a2a285e67dba583d6f1bee0716cc89103fee0c7d0f52fadc0f9ac5b13e833834e7279963726950d3897847e7acac61857257fc031692033e

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_hu.dll

                                                Filesize

                                                29KB

                                                MD5

                                                ee19156c12d2d7cce9b12e515f9ac6c5

                                                SHA1

                                                19ad46e40b3c1cb6195231bfcf45bb68ee1b43bf

                                                SHA256

                                                c290883b4b99758792284755efa52c12eb09039f0f8027d8ba3b1d4bb2f3846f

                                                SHA512

                                                631364472a450519ad8959971d6c319610570ca37b4486ea12d6af5b46aaecbf336aadddd1f3fefba841534ff82adf905b1e1a008638ed784bf08870a3b86ee1

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_id.dll

                                                Filesize

                                                28KB

                                                MD5

                                                eacd4638369bf96ccc7c23af37e15b5d

                                                SHA1

                                                15c4878b78c06095981abcc589c4a6f265ef96a3

                                                SHA256

                                                a53c0fd74995090dbf48bbba4a00560e3cc344ce8120b8b2bfa1f9b953b536ef

                                                SHA512

                                                19cc8d25bd8fd84481f77d301f79636208df5807647ddc6cb6beff3882d94672db49daa4ddfff0c334b584742f9d2fea3af73977032d7dfccd0cfd1314af4ae6

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_is.dll

                                                Filesize

                                                28KB

                                                MD5

                                                19d44de8f930e07f41f9343478ed5c1d

                                                SHA1

                                                83ee0c5a86997dd491bd8312d221dde2b2e7d44a

                                                SHA256

                                                69d3a21b7723e4df8b7b97e39493081e41231e2d3a3f5a4de462db41339987ec

                                                SHA512

                                                4edb82aedfeca743a03815a889eca766fec8083afd0defa098593297a52edaf1780dbd5ad1d3325c614d815d34d8c57ec2283a0db215f94f42819f1890089c4a

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_it.dll

                                                Filesize

                                                30KB

                                                MD5

                                                26cbb965c6976f59ac385ef9408bf81a

                                                SHA1

                                                16bb0530338e600fdfd13a7b03523a715e633bcb

                                                SHA256

                                                bed996b25f77c7d4328d96147ed388f1b457abfc0510eb8956be4339d103821a

                                                SHA512

                                                1efb1bdf0276de17f8516cde4d435e0be8fd066f52fb5d4c9e2fe2e17a135296ab6b34f523284941beae438e97d7e65de26f0541b7c437bceff229b60da4bb0d

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_iw.dll

                                                Filesize

                                                25KB

                                                MD5

                                                98f79d77ab05304bba8d60e50914418f

                                                SHA1

                                                957590adc0f8a7274e765e2a804c1de7c76e3040

                                                SHA256

                                                3764941b873ed59d5bc1097f6b9382ba59c06d443a96ff71ba6b693f161da522

                                                SHA512

                                                9ca6af5c14193dce7b50251f1b9205870435e60b5495ab1a9f0d42ca14b98b78fef51bf3cd4165394ca5ba28d0e98bea7642ec67039c0f146383136145c7de59

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_ja.dll

                                                Filesize

                                                24KB

                                                MD5

                                                b89ba9ecc6d4c77abff61b1c75fff16c

                                                SHA1

                                                f381408f26be2c77c7b59681ad6280a701ccb472

                                                SHA256

                                                bbd2c970f747a6ee8e4735939225f607ae630ddc6e2e39954e0300ca9a7a88b2

                                                SHA512

                                                53a3db82f4cf5a300a5eab7692f4084451b987ad72ae24d9118d80f18692ac3604981c0e871c7a7625c5153803aea0e093d91822d33af0c10a07bcb6e766a5b6

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_ka.dll

                                                Filesize

                                                29KB

                                                MD5

                                                d464fd223ba898e6fef4e485a3118394

                                                SHA1

                                                59c78983ce859485fea5458ba4e7803c38012b9d

                                                SHA256

                                                066c5c4b4c87ffd201d0dbfc43cb7566cfb03a6ed2fbf8698220fb919637294d

                                                SHA512

                                                6ac1d5fc59e6b7a10532902b059ac25a2bf58b0a63ab586e89b293e2de732c1d5d580c75ff28e4a2660a6ee3f0389f49e388567bcc07dd6e1cfd5d019db3ea52

                                              • C:\Program Files (x86)\Microsoft\Temp\EU7133.tmp\msedgeupdateres_kk.dll

                                                Filesize

                                                28KB

                                                MD5

                                                1b1202fc3e46d7b46ce3cb46cdc5ab21

                                                SHA1

                                                e76d1065035d86eef011feb3cad3ac38eecd0b7d

                                                SHA256

                                                b660a0e1d5161765881e0a7fd9d714abce341403b21f63667ffdedf7d5a254d0

                                                SHA512

                                                7f11d5d6995f27bb4f8705ac7310273f070a71adc73cdb70d74766c89437b3e7a10453fc55588ac223fe3b449564758a49380168d779fdb6a4fac3b5cde767ea

                                              • C:\Program Files\MsEdgeCrashpad\settings.dat

                                                Filesize

                                                280B

                                                MD5

                                                728c9836fe62e5d8e5be5817024680cb

                                                SHA1

                                                f7399fa4730446e44c1c9fa7890365974b8a2c71

                                                SHA256

                                                1d10e74c7314cbdc546ceb7f7748bdc7973d78d2a5124e487879b0b2571bf6c9

                                                SHA512

                                                c76c16a51cde2fe031a40a3c4b6b473fb8ac29978d908c18f67e03079a655333ab012201bcd66e0c67de9f4afdfd3ab177d2c42d24f971dc07a43760c32abc9a

                                              • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                                Filesize

                                                181KB

                                                MD5

                                                b6f40bea86689637391898735621a5aa

                                                SHA1

                                                adfeabc2710b223afaeca50281fe3f868ec6c1bb

                                                SHA256

                                                7bd06c4a33d55976e5d2272111b381bcb6e63458b603953002859519a0eff996

                                                SHA512

                                                aee38a92b1b8fdc92bb646c2f257f1c038d5f1fed25b0b8d1375f20d3650214dfa095091e7c5a0c77a43d2e6b25e4df4d18c8ee3269ddb49c62a03411f4f3dd5

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                e4f80e7950cbd3bb11257d2000cb885e

                                                SHA1

                                                10ac643904d539042d8f7aa4a312b13ec2106035

                                                SHA256

                                                1184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124

                                                SHA512

                                                2b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                Filesize

                                                152B

                                                MD5

                                                2dc1a9f2f3f8c3cfe51bb29b078166c5

                                                SHA1

                                                eaf3c3dad3c8dc6f18dc3e055b415da78b704402

                                                SHA256

                                                dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa

                                                SHA512

                                                682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                Filesize

                                                265B

                                                MD5

                                                f5cd008cf465804d0e6f39a8d81f9a2d

                                                SHA1

                                                6b2907356472ed4a719e5675cc08969f30adc855

                                                SHA256

                                                fcea95cc39dc6c2a925f5aed739dbedaa405ee4ce127f535fcf1c751b2b8fb5d

                                                SHA512

                                                dc97034546a4c94bdaa6f644b5cfd1e477209de9a03a5b02a360c254a406c1d647d6f90860f385e27387b35631c41f0886cb543ede9116436941b9af6cd3285d

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                873c8120a91e06fe661eb5565e29bbea

                                                SHA1

                                                3c332b10313fb5d15d105fbe90317dcb632c2855

                                                SHA256

                                                29f68df334db30931ea60efa35ccc0c9e67254d6348f057a006f5f5579f3a0ac

                                                SHA512

                                                b9f50fa3ad9895042ad65a97935ba499d13427d5daca2fe3fa09e42631cb2a0b4c957fe31735aef57b9b3a7113a07c59b09aa3400424a46ff21ef48a412f5dfb

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                8839ae1ec05e4af84221d1d1d7ccc9fa

                                                SHA1

                                                9bbcc9b1f2caf4d7153993c8bc9925eac247f1af

                                                SHA256

                                                a2f2579366efd1395a5e3b3db77c0ee0c8b435f1dc451f90b5546e816f3ba883

                                                SHA512

                                                ebcbda3c60db40b465ede1a91a72beb415a11363d84ce00eb6900569da33c863c526f0541926212ef497a6d219fd458591076eda48896ff89c8d60b8c58a84b4

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                6752a1d65b201c13b62ea44016eb221f

                                                SHA1

                                                58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                SHA256

                                                0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                SHA512

                                                9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                Filesize

                                                11KB

                                                MD5

                                                df783a6dab91bedf32a9d1d01b7c0bca

                                                SHA1

                                                867198f61af0009b5c977f7cd306fcc24e52584e

                                                SHA256

                                                5b9f2833783b23e260e86ab77c03575ef11535f146733baa5ceb65a2f4f96d71

                                                SHA512

                                                8bd80de58f7971521f4e1e2b341f676b7f2eb952d5b52203e71c74cf65a0acdc4aa282dda11a4aecffe58f9b0c8b6251d2b4a53f884b2e44724c4f7f68d9ea99

                                              • C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe

                                                Filesize

                                                1.6MB

                                                MD5

                                                45e5ca74b9ae3c3fc6f6a63c609783b6

                                                SHA1

                                                f36715bea96d69bb18075fac30b90502c6d2464b

                                                SHA256

                                                b4afd37b9087df7e041ae749fd0fa342926d9cce533bde9cdc4283132c3820a9

                                                SHA512

                                                014fd398d456fcb118dfd6b038b6f96008ca209d44d9707e175e85e7f14cfb3f2886deaed0d8ed25971813035e8dd7f88142c06972f3e2c9b4a534d84bec661a

                                              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_kep3zgfw.puw.ps1

                                                Filesize

                                                60B

                                                MD5

                                                d17fe0a3f47be24a6453e9ef58c94641

                                                SHA1

                                                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                SHA256

                                                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                SHA512

                                                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Crashpad\settings.dat

                                                Filesize

                                                280B

                                                MD5

                                                2f6f4fa86d970e239335e275a015cb7e

                                                SHA1

                                                7e13fa04c9d4079095c7da4bcff383c6d38313d8

                                                SHA256

                                                b2298dc8d645c2d51f1fac9242ad52e034b7a1862647573ecfca8882ddca04d7

                                                SHA512

                                                6a00ac60b4497b85a6cf4c7a97a0e24e4e3f8eca3467631985981ac59dd8f5bec9f137a4123cc8ee4ec13d29c9d94073ee6b9079a606a8f9b72240810179dc6f

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Crashpad\settings.dat

                                                Filesize

                                                280B

                                                MD5

                                                60028a5de2935fe8b8ef470f0b2bc5eb

                                                SHA1

                                                b3351ad13f66874a63ea58b50ec8acfab5a9442e

                                                SHA256

                                                b12e3794db51c967e3415e9be11e0b8122555c924a0d68e510704a05c884ac99

                                                SHA512

                                                af2669e79581af2c9cdc3b0bf483749d21fe3567ab992ebb0e9c6407b2c1ff1ed3225927e8731529aae22b2aa8f36207ff35026d63b9b9b1a2786d0bc71909ed

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Crashpad\settings.dat

                                                Filesize

                                                280B

                                                MD5

                                                10c72f4d76d5b20930491ab066285153

                                                SHA1

                                                ffe98978b460ac2b5f3085abe8da4b61dee74c75

                                                SHA256

                                                ed0ed1bc3c79935120be6345109d4eeadc8dc3b8ee99a4dc5863e6d12ab343c4

                                                SHA512

                                                8317115acc2291fc7ee6fb1d09bd772f45072d48cbf0157b462a87457badbdc138b258aed382ba94af3939b7b9e471ad1f07f224f23e07920b135345ac74049d

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Crashpad\settings.dat

                                                Filesize

                                                280B

                                                MD5

                                                6bdac7ed711475b3ea125c169e39ce54

                                                SHA1

                                                aacc1559921d293276cdcccc64f6be1df59eeda9

                                                SHA256

                                                3e06f494170ba1163a7fddbc15f5a32d7112a06cea68dcfb6b7c5e192cfeaa8b

                                                SHA512

                                                71a40b6c987d2cdf66503c4dc2da104241f7f0d4dcf9d37701365b3c8a48d27288828fd64efe8c47c22620d8a3675665acba8b15c135e2401fd9c6ac6d247529

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index

                                                Filesize

                                                96B

                                                MD5

                                                e4fc580eafceb2a9b1ce9516f9ef804f

                                                SHA1

                                                4a2b56552fbda84b80955cc6fe46e53fa95cef8c

                                                SHA256

                                                00da041cd67104eb870f93624fc5e3e35fa601ed094a29e47cc0b1e06d5e4def

                                                SHA512

                                                f830019d6f05dd65cf07bd7e538882b186a55ff670a0dbc3f03dad755e88533d91824f199538b8a98697d23db7fe64b19caffd55d5dd48c6bbce4e5b55348daf

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index

                                                Filesize

                                                120B

                                                MD5

                                                a72eb35daff9b3e0f36f6ef98fec7e47

                                                SHA1

                                                f217a5665e4cb0df5914026c4a6871d08d423292

                                                SHA256

                                                a4264116220761fa70c5da1a20286b2cf363e71801e6a0552198f4ea64430869

                                                SHA512

                                                485dd44720cdad420dfe14beb965d4c2b5e2a5b52e548588917536a486cf3cda53035510bc327f75c5221de823b212195375539c932b08f3c5c3b5a260620695

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index~RFe5a1b0b.TMP

                                                Filesize

                                                48B

                                                MD5

                                                5836608e302fd9a4c56542cb8918d9b8

                                                SHA1

                                                5ada1f43253b8e525e83720524a1602a9eae37fb

                                                SHA256

                                                c0e80b09c55769abe4d5ee2055731f82f856557b0002bfc36e9205d0a830a5a8

                                                SHA512

                                                51602fd275ee63c4c1205e02782b3e84cccc0aad40b43a204366c286451b623c47f9a34d9a346af67bb612eb3ffb5e9d2114319236c3a9c39edac2ef61d30fb8

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Default\Network\23714e23-8649-4e6d-89a0-eacc2ce5a21b.tmp

                                                Filesize

                                                40B

                                                MD5

                                                20d4b8fa017a12a108c87f540836e250

                                                SHA1

                                                1ac617fac131262b6d3ce1f52f5907e31d5f6f00

                                                SHA256

                                                6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

                                                SHA512

                                                507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Default\Network\Network Persistent State

                                                Filesize

                                                111B

                                                MD5

                                                285252a2f6327d41eab203dc2f402c67

                                                SHA1

                                                acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                SHA256

                                                5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                SHA512

                                                11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Default\Network\Network Persistent State~RFe5a512e.TMP

                                                Filesize

                                                59B

                                                MD5

                                                2800881c775077e1c4b6e06bf4676de4

                                                SHA1

                                                2873631068c8b3b9495638c865915be822442c8b

                                                SHA256

                                                226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                                SHA512

                                                e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Default\Network\SCT Auditing Pending Reports

                                                Filesize

                                                2B

                                                MD5

                                                d751713988987e9331980363e24189ce

                                                SHA1

                                                97d170e1550eee4afc0af065b78cda302a97674c

                                                SHA256

                                                4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                SHA512

                                                b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Default\Network\TransportSecurity

                                                Filesize

                                                184B

                                                MD5

                                                82c5cf15264456cd65afd72f88199005

                                                SHA1

                                                6d6918d8c302b90ee6a484eb325a333e491e7f94

                                                SHA256

                                                2f03c36d1b508e51aacd844dc148c8cc48294b00465ccdf3dbdb09fd499b61a7

                                                SHA512

                                                8f4411f4d9ef8f858f1879608c9eec1310b137a8ea69728b8782798b31e6f368e86d237bb279157e647b59338b65dc107475bcee2f92d414a39397e38c391e3b

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                040ca96072a004959e43bd2d552d4da7

                                                SHA1

                                                ee13e320953eb95af9b710fba2664ca9accc75af

                                                SHA256

                                                1c31856767a3617fd4ee4713cbb8cae6c8586d55cab66821e73902c1a93ae244

                                                SHA512

                                                f30df58e303a8f5fd8782eda43e52fbc79066672688b7659a7b4b6b303efb52329a26cdd69227d618bd4e58a45aac85b300794ae3dedcc7bffa1cffcd056051e

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                824a03cadeb23cdadce12e01c9803b82

                                                SHA1

                                                d3b48df34fff679659031698e46394befc81037a

                                                SHA256

                                                77513a5b0c5cbebd01897436d7c01c4f876d743effb625fb0477a14f2a770f60

                                                SHA512

                                                195efd4cb5a43ec56a2fe7965ee6f9bb2663c2b96855e7d8ddfe348a3d532fafadb112d27c80e420f909df58d165432b196eb6fd655b873223cd9d899e0f08a0

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Default\Preferences

                                                Filesize

                                                6KB

                                                MD5

                                                3749fe131abbd68363c3778c2ab74ddc

                                                SHA1

                                                0b8b6edd28e3a382a4d528af3131069a43973d1a

                                                SHA256

                                                461427935496a2cd582c4cda40a1a5446c4c0b26ae70a6b5628d744fdc102dc7

                                                SHA512

                                                ed703ea549dd745063c9a90cfc29169abab69b37083ffdff8be592572234defd3afb59b95262b2ad2331c658bb224e8a656782f1184c41c39d6886308fea0d89

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Default\Preferences~RFe5a5100.TMP

                                                Filesize

                                                6KB

                                                MD5

                                                3105fdeceaba18e4556bc49ad6944b9c

                                                SHA1

                                                6a56bef929d61dc22620415151f38c9485668620

                                                SHA256

                                                265a67235fe96ab17961d08a55e176bbf4f5bf36d85da5f20566a50f77ec6e8a

                                                SHA512

                                                f81d91c9be386e53c450ff909e3cdfa8b21792007f04d8bfbd0508092dddb12e9f9191f401a371fcf61398033bcc9c1fa57fa09f01a48dbc3c51a9f6815ce612

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Default\Site Characteristics Database\MANIFEST-000001

                                                Filesize

                                                41B

                                                MD5

                                                5af87dfd673ba2115e2fcf5cfdb727ab

                                                SHA1

                                                d5b5bbf396dc291274584ef71f444f420b6056f1

                                                SHA256

                                                f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                SHA512

                                                de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Default\shared_proto_db\metadata\CURRENT

                                                Filesize

                                                16B

                                                MD5

                                                46295cac801e5d4857d09837238a6394

                                                SHA1

                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                SHA256

                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                SHA512

                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\GrShaderCache\data_0

                                                Filesize

                                                8KB

                                                MD5

                                                cf89d16bb9107c631daabf0c0ee58efb

                                                SHA1

                                                3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                                SHA256

                                                d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                                SHA512

                                                8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\GrShaderCache\data_1

                                                Filesize

                                                264KB

                                                MD5

                                                d0d388f3865d0523e451d6ba0be34cc4

                                                SHA1

                                                8571c6a52aacc2747c048e3419e5657b74612995

                                                SHA256

                                                902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                                                SHA512

                                                376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\GrShaderCache\data_2

                                                Filesize

                                                8KB

                                                MD5

                                                0962291d6d367570bee5454721c17e11

                                                SHA1

                                                59d10a893ef321a706a9255176761366115bedcb

                                                SHA256

                                                ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                                SHA512

                                                f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\GrShaderCache\data_3

                                                Filesize

                                                8KB

                                                MD5

                                                41876349cb12d6db992f1309f22df3f0

                                                SHA1

                                                5cf26b3420fc0302cd0a71e8d029739b8765be27

                                                SHA256

                                                e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                                SHA512

                                                e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Local State

                                                Filesize

                                                1KB

                                                MD5

                                                7b946626267b36c44e33e77f447e49e8

                                                SHA1

                                                750bd02dfe434b1e0c9e1d7e9724dcc57fb30ed6

                                                SHA256

                                                30cf5e5febb252714b2b0f61d0b5dbbf5894a184c2547e330b338a4854a23f77

                                                SHA512

                                                4b63ee82722782edab4732d472fd79d7711f69f6f858d9049000b9773b10de7518858c3523d6e1859c472f05009b8d4db6c193fc6234c99f2df44b2c7590494c

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Local State

                                                Filesize

                                                2KB

                                                MD5

                                                d99f16c052937a8f4278b158f446d2ab

                                                SHA1

                                                690815e7251a0bf28965031e4e740f69d647a1bc

                                                SHA256

                                                5f7555afbdf6da66bb1924b5b526b17b3f0cf526dc965b0b3708ee2ab0c715d0

                                                SHA512

                                                3456d1c1f459f293b71e28b6499448d4efabbdd4dc33d6469ca464558701ad4709a747cbf9c677c1425176d6cff545f7288ddf5ee04063ff3c0271349845f7be

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Local State

                                                Filesize

                                                16KB

                                                MD5

                                                eef52a0dc32447149fea2a9579e2f62c

                                                SHA1

                                                3c08a3e5702d7e79c88f7d15447e46efd88da85f

                                                SHA256

                                                3212467368c4f4413f59f989421f4dc2a5424c12749337bfb604b40ef4431e9e

                                                SHA512

                                                104199393f869455353ba051d0ad55f20f514b1a4a901200384e21811158111b50a94a549a05c128b5c7e77d6038da977539eee6e57f0e489426cbd68889e98c

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Local State

                                                Filesize

                                                3KB

                                                MD5

                                                78db0c86887a95f336041c39674de4b0

                                                SHA1

                                                7fb7757871136c9b02858516320ef5771a91fba4

                                                SHA256

                                                06d71a40958acb842ddbe9318658d46c626c09a1ada781e934358c3932f85f2d

                                                SHA512

                                                e70477c31c20e7b33d160c7cb3829d3af8b8e70e25b763c1c6cc1073826245d39b25cc40d872a4023e58c348edf8f44589cc06b1869d1f1d9501c6791a098130

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Local State

                                                Filesize

                                                17KB

                                                MD5

                                                a69cf14d72e48f8f7b2e07f63700f289

                                                SHA1

                                                ceaa8c51ba016a781345facc912b01fca9b3bf18

                                                SHA256

                                                eeb0feecd14c2bad78204e5d5e65fba0d0da63639e6349955860be980a657d44

                                                SHA512

                                                65491985e1be483d6241a6a96e4403277cc810dd481282e9a720622194eb14f189b1c92677e335b1f649a18814dffd4eee15abccf029bbd96b44b648959af9a7

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Local State

                                                Filesize

                                                17KB

                                                MD5

                                                8fb5dfde3e140fcddb4ac72863be88b5

                                                SHA1

                                                71720ab3fce3d9598173aeee02af9671b53ef204

                                                SHA256

                                                20f820a17d47f1e33a88736a7c43651e7ff4fd25ba6111a8edb57a5f4bc2ef72

                                                SHA512

                                                c97bb4e82175f422d671980dcbc4f8559470c50dd80c8543a16a894fb53ba063cee48aa70da44676e27e4079c44fdba9c770ef36971fc0e532800abbd10873c6

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Local State

                                                Filesize

                                                16KB

                                                MD5

                                                ceeba8a36081bf4ea7a987a923ffa64a

                                                SHA1

                                                1ff44aa15e1c694c335ac01fb617c5d32b13e664

                                                SHA256

                                                36e685ed9ca7ddb30b0246f173e3b90cb89776935f7b3333355bdbe046d0dbe6

                                                SHA512

                                                efecfa58d27fbf13e19497f3d66281e33b557a41b8ddbf26e9a80b44c165fd5d07ff0ab63f27cd5f550225e59fdd42faae7be93669556edfb33706106b985e83

                                              • C:\Users\Admin\AppData\Roaming\LoaderV6.exe\EBWebView\Local State~RFe59cb16.TMP

                                                Filesize

                                                1KB

                                                MD5

                                                88e748694ad4f03e49c65be1e64066ef

                                                SHA1

                                                de72cfdd2508292dcb66bba38b2ae18fd45ca963

                                                SHA256

                                                3bc85baea315df3fa00b863bcf4042deae4916c969c54b17d2ffa5615f430e63

                                                SHA512

                                                7df4075bf88d3c70988778cd2aefee8cd05c701b7ea4b0541f1eb0e0c8b8db33f299699f10ced0bb24105d7d657e97150c4a1fecd2c0a555587b7790839d1fe1

                                              • C:\Users\Admin\Downloads\Unconfirmed 13890.crdownload

                                                Filesize

                                                17.5MB

                                                MD5

                                                14f1142ba2a969fb79ee60886aa89eee

                                                SHA1

                                                7ccd15d2b1db1001c6c17550e7c3735494dd60a0

                                                SHA256

                                                6edabaa1a35a493910bfa9e21bbc0ebe851cb631a2ec49d22c006109834426ba

                                                SHA512

                                                73ef2830ea8e3ed332f4ec85833a8b497263fddd6bd1fce4d0885e37025ed89354543aa42406bb6e13bb6ed61cc05e429c7b09f19d8c7c79893467fa52f7c86b

                                              • \??\pipe\LOCAL\crashpad_3180_JRUJNSYOYRDUVPBE

                                                MD5

                                                d41d8cd98f00b204e9800998ecf8427e

                                                SHA1

                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                SHA256

                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                SHA512

                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                              • memory/752-641-0x0000000003E10000-0x0000000004210000-memory.dmp

                                                Filesize

                                                4.0MB

                                              • memory/752-642-0x00007FFE16790000-0x00007FFE16985000-memory.dmp

                                                Filesize

                                                2.0MB

                                              • memory/752-644-0x00000000770C0000-0x00000000772D5000-memory.dmp

                                                Filesize

                                                2.1MB

                                              • memory/752-633-0x00000000010B0000-0x000000000112E000-memory.dmp

                                                Filesize

                                                504KB

                                              • memory/752-634-0x00000000010B0000-0x000000000112E000-memory.dmp

                                                Filesize

                                                504KB

                                              • memory/752-640-0x0000000003E10000-0x0000000004210000-memory.dmp

                                                Filesize

                                                4.0MB

                                              • memory/776-990-0x0000000003320000-0x0000000003720000-memory.dmp

                                                Filesize

                                                4.0MB

                                              • memory/776-993-0x00000000770C0000-0x00000000772D5000-memory.dmp

                                                Filesize

                                                2.1MB

                                              • memory/776-991-0x00007FFE16790000-0x00007FFE16985000-memory.dmp

                                                Filesize

                                                2.0MB

                                              • memory/776-986-0x00000000006B0000-0x000000000072E000-memory.dmp

                                                Filesize

                                                504KB

                                              • memory/776-988-0x00000000006B0000-0x000000000072E000-memory.dmp

                                                Filesize

                                                504KB

                                              • memory/1156-537-0x0000029972E40000-0x0000029972E62000-memory.dmp

                                                Filesize

                                                136KB

                                              • memory/1892-478-0x00007FFE15300000-0x00007FFE15301000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/2776-987-0x00007FF65CE90000-0x00007FF65D9ED000-memory.dmp

                                                Filesize

                                                11.4MB

                                              • memory/2912-378-0x0000000000520000-0x0000000000555000-memory.dmp

                                                Filesize

                                                212KB

                                              • memory/2912-318-0x00000000747E0000-0x0000000074A05000-memory.dmp

                                                Filesize

                                                2.1MB

                                              • memory/2912-309-0x00000000747E0000-0x0000000074A05000-memory.dmp

                                                Filesize

                                                2.1MB

                                              • memory/2912-308-0x0000000000520000-0x0000000000555000-memory.dmp

                                                Filesize

                                                212KB

                                              • memory/3272-457-0x00007FFE14990000-0x00007FFE14991000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/3272-458-0x00007FFE15A80000-0x00007FFE15A81000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/3624-996-0x0000000002070000-0x0000000002470000-memory.dmp

                                                Filesize

                                                4.0MB

                                              • memory/3624-999-0x00000000770C0000-0x00000000772D5000-memory.dmp

                                                Filesize

                                                2.1MB

                                              • memory/3624-997-0x00007FFE16790000-0x00007FFE16985000-memory.dmp

                                                Filesize

                                                2.0MB

                                              • memory/3936-648-0x00007FFE16790000-0x00007FFE16985000-memory.dmp

                                                Filesize

                                                2.0MB

                                              • memory/3936-650-0x00000000770C0000-0x00000000772D5000-memory.dmp

                                                Filesize

                                                2.1MB

                                              • memory/3936-647-0x0000000002B90000-0x0000000002F90000-memory.dmp

                                                Filesize

                                                4.0MB

                                              • memory/3936-645-0x0000000000D30000-0x0000000000D39000-memory.dmp

                                                Filesize

                                                36KB

                                              • memory/4064-441-0x00007FFE15300000-0x00007FFE15301000-memory.dmp

                                                Filesize

                                                4KB

                                              • memory/4064-598-0x0000021088300000-0x0000021088415000-memory.dmp

                                                Filesize

                                                1.1MB

                                              • memory/4284-635-0x00007FF7861D0000-0x00007FF786D2D000-memory.dmp

                                                Filesize

                                                11.4MB

                                              • memory/5956-966-0x0000015704A90000-0x0000015704BA5000-memory.dmp

                                                Filesize

                                                1.1MB