Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    12-08-2024 09:57

General

  • Target

    https://github.com/Abhijeet-N/Solara-roblox-executor

Malware Config

Signatures

  • Rhadamanthys

    Rhadamanthys is an info stealer written in C++ first seen in August 2022.

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 8 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 32 IoCs
  • Loads dropped DLL 62 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Checks system information in the registry 2 TTPs 14 IoCs

    System information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 10 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Detects videocard installed 1 TTPs 2 IoCs

    Uses WMIC.exe to determine videocard installed.

  • Enumerates system info in registry 2 TTPs 9 IoCs
  • GoLang User-Agent 3 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Modifies data under HKEY_USERS 59 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 41 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 42 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\sihost.exe
    sihost.exe
    1⤵
      PID:3036
      • C:\Windows\SysWOW64\openwith.exe
        "C:\Windows\system32\openwith.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:5144
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Abhijeet-N/Solara-roblox-executor
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2432
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffcfef63cb8,0x7ffcfef63cc8,0x7ffcfef63cd8
        2⤵
          PID:4920
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,13553328763252514638,15672888487664649287,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1952 /prefetch:2
          2⤵
            PID:2956
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1940,13553328763252514638,15672888487664649287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:3
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:576
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1940,13553328763252514638,15672888487664649287,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:8
            2⤵
              PID:4324
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,13553328763252514638,15672888487664649287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
              2⤵
                PID:3408
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,13553328763252514638,15672888487664649287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:1
                2⤵
                  PID:1608
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1940,13553328763252514638,15672888487664649287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3964
                • C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1940,13553328763252514638,15672888487664649287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5872 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1376
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,13553328763252514638,15672888487664649287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:1
                  2⤵
                    PID:2484
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,13553328763252514638,15672888487664649287,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:1
                    2⤵
                      PID:2284
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,13553328763252514638,15672888487664649287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
                      2⤵
                        PID:5024
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,13553328763252514638,15672888487664649287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:1
                        2⤵
                          PID:2372
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1940,13553328763252514638,15672888487664649287,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:1
                          2⤵
                            PID:3236
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1940,13553328763252514638,15672888487664649287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5904 /prefetch:8
                            2⤵
                            • NTFS ADS
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2820
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1940,13553328763252514638,15672888487664649287,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=2872 /prefetch:2
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:5124
                        • C:\Windows\System32\CompPkgSrv.exe
                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                          1⤵
                            PID:3028
                          • C:\Windows\System32\CompPkgSrv.exe
                            C:\Windows\System32\CompPkgSrv.exe -Embedding
                            1⤵
                              PID:4832
                            • C:\Windows\System32\rundll32.exe
                              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                              1⤵
                                PID:2008
                              • C:\Users\Admin\Downloads\setupV2\setupV2\setupV2\setupV2.exe
                                "C:\Users\Admin\Downloads\setupV2\setupV2\setupV2\setupV2.exe"
                                1⤵
                                • Loads dropped DLL
                                • Suspicious behavior: EnumeratesProcesses
                                PID:5624
                                • C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe
                                  C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe
                                  2⤵
                                  • Executes dropped EXE
                                  • Drops file in Program Files directory
                                  • System Location Discovery: System Language Discovery
                                  PID:5796
                                  • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\MicrosoftEdgeUpdate.exe
                                    "C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\MicrosoftEdgeUpdate.exe" /installsource taggedmi /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"
                                    3⤵
                                    • Event Triggered Execution: Image File Execution Options Injection
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Checks system information in the registry
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2096
                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
                                      4⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • System Location Discovery: System Language Discovery
                                      • Modifies registry class
                                      PID:5332
                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
                                      4⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • System Location Discovery: System Language Discovery
                                      • Modifies registry class
                                      PID:5212
                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                        5⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Modifies registry class
                                        PID:5220
                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                        5⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Modifies registry class
                                        PID:5208
                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                        5⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Modifies registry class
                                        PID:5432
                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMjIwMDAuNDkzIiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiIvPjxhcHAgYXBwaWQ9IntGM0M0RkUwMC1FRkQ1LTQwM0ItOTU2OS0zOThBMjBGMUJBNEF9IiB2ZXJzaW9uPSIxLjMuMTQzLjU3IiBuZXh0dmVyc2lvbj0iMS4zLjE5NS4xNSIgbGFuZz0iIiBicmFuZD0iIiBjbGllbnQ9IiI-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMCIgc3lzdGVtX3VwdGltZV90aWNrcz0iNTE2NDM2NDE0MCIgaW5zdGFsbF90aW1lX21zPSI1NTUiLz48L2FwcD48L3JlcXVlc3Q-
                                      4⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Checks system information in the registry
                                      • System Location Discovery: System Language Discovery
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      PID:5460
                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource taggedmi /sessionid "{446340BB-1505-46C6-ADB9-B3439C433620}"
                                      4⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • System Location Discovery: System Language Discovery
                                      PID:5552
                                • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe
                                  "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=setupV2.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=5624.4348.4104152640225914395
                                  2⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  PID:5820
                                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe
                                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.100 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=127.0.2651.98 --initial-client-data=0x180,0x184,0x188,0x15c,0x194,0x7ffcea04d198,0x7ffcea04d1a4,0x7ffcea04d1b0
                                    3⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    PID:4660
                              • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
                                1⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Checks system information in the registry
                                • System Location Discovery: System Language Discovery
                                • Modifies data under HKEY_USERS
                                PID:1596
                                • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iJnF1b3Q7aFZmRGpNZEZHNkZnS3MwTno2ZW1yWUNTZzZUUXZEUG9tb2xSYXlRWEJLND0mcXVvdDsiLz48YXBwIGFwcGlkPSJ7OEE2OUQzNDUtRDU2NC00NjNjLUFGRjEtQTY5RDlFNTMwRjk2fSIgdmVyc2lvbj0iMTIzLjAuNjMxMi4xMjMiIG5leHR2ZXJzaW9uPSIiIGxhbmc9ImVuIiBicmFuZD0iR0dMUyIgY2xpZW50PSIiIGluc3RhbGxhZ2U9IjkiIGluc3RhbGxkYXRldGltZT0iMTcyMjYxMzExMiIgb29iZV9pbnN0YWxsX3RpbWU9IjEzMzY3MDg1Njk4NTY5NzA4NSI-PGV2ZW50IGV2ZW50dHlwZT0iMzEiIGV2ZW50cmVzdWx0PSIxIiBlcnJvcmNvZGU9IjAiIGV4dHJhY29kZTE9IjIxMTQzMjUiIHN5c3RlbV91cHRpbWVfdGlja3M9IjUxNjkwMDI3MjUiLz48L2FwcD48L3JlcXVlc3Q-
                                  2⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Checks system information in the registry
                                  • System Location Discovery: System Language Discovery
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  PID:1484
                                • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B5E95DAB-281A-4F6D-8109-D10223047AF6}\MicrosoftEdge_X64_127.0.2651.98.exe
                                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B5E95DAB-281A-4F6D-8109-D10223047AF6}\MicrosoftEdge_X64_127.0.2651.98.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
                                  2⤵
                                  • Executes dropped EXE
                                  PID:2988
                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B5E95DAB-281A-4F6D-8109-D10223047AF6}\EDGEMITMP_2CD1E.tmp\setup.exe
                                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B5E95DAB-281A-4F6D-8109-D10223047AF6}\EDGEMITMP_2CD1E.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B5E95DAB-281A-4F6D-8109-D10223047AF6}\MicrosoftEdge_X64_127.0.2651.98.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
                                    3⤵
                                    • Executes dropped EXE
                                    • Drops file in Program Files directory
                                    • Drops file in Windows directory
                                    PID:5240
                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B5E95DAB-281A-4F6D-8109-D10223047AF6}\EDGEMITMP_2CD1E.tmp\setup.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B5E95DAB-281A-4F6D-8109-D10223047AF6}\EDGEMITMP_2CD1E.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\SystemTemp\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.100 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{B5E95DAB-281A-4F6D-8109-D10223047AF6}\EDGEMITMP_2CD1E.tmp\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.98 --initial-client-data=0x244,0x248,0x24c,0x220,0x250,0x7ff7078db7d0,0x7ff7078db7dc,0x7ff7078db7e8
                                      4⤵
                                      • Executes dropped EXE
                                      • Drops file in Windows directory
                                      PID:5284
                                • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                  "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuMTUiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuMTUiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7NDQ2MzQwQkItMTUwNS00NkM2LUFEQjktQjM0MzlDNDMzNjIwfSIgdXNlcmlkPSJ7NjAzRjA2NkEtQTM1RC00REMxLTg5NDktRDUzRTVFNkU4MDlCfSIgaW5zdGFsbHNvdXJjZT0idGFnZ2VkbWkiIHJlcXVlc3RpZD0ie0U5RkJEQkJFLTAwNzctNDdBNS1CQjkyLUZEMTkwQzQ2ODVBRH0iIGRlZHVwPSJjciIgZG9tYWluam9pbmVkPSIwIj48aHcgbG9naWNhbF9jcHVzPSI4IiBwaHlzbWVtb3J5PSI4IiBkaXNrX3R5cGU9IjIiIHNzZT0iMSIgc3NlMj0iMSIgc3NlMz0iMSIgc3NzZTM9IjEiIHNzZTQxPSIxIiBzc2U0Mj0iMSIgYXZ4PSIxIi8-PG9zIHBsYXRmb3JtPSJ3aW4iIHZlcnNpb249IjEwLjAuMjIwMDAuNDkzIiBzcD0iIiBhcmNoPSJ4NjQiIHByb2R1Y3RfdHlwZT0iNDgiIGlzX3dpcD0iMCIgaXNfaW5fbG9ja2Rvd25fbW9kZT0iMCIvPjxvZW0gcHJvZHVjdF9tYW51ZmFjdHVyZXI9IiIgcHJvZHVjdF9uYW1lPSIiLz48ZXhwIGV0YWc9IiZxdW90O1ZQUW9QMUYrZnExNXdSemgxa1BMNFBNcFdoOE9STUI1aXp2ck9DL2NoalE9JnF1b3Q7Ii8-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-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-PGV2ZW50IGV2ZW50dHlwZT0iMiIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMTk2NzU3IiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1ODU2MTI1ODIxIiBzb3VyY2VfdXJsX2luZGV4PSIwIiBkb25lX2JlZm9yZV9vb2JlX2NvbXBsZXRlPSIwIiB1cGRhdGVfY2hlY2tfdGltZV9tcz0iOTYwIiBkb3dubG9hZF90aW1lX21zPSIyMTkzOSIgZG93bmxvYWRlZD0iMTcyNjA2NDA4IiB0b3RhbD0iMTcyNjA2NDA4IiBwYWNrYWdlX2NhY2hlX3Jlc3VsdD0iMCIgaW5zdGFsbF90aW1lX21zPSI0NDAxNCIvPjwvYXBwPjwvcmVxdWVzdD4
                                  2⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Checks system information in the registry
                                  • System Location Discovery: System Language Discovery
                                  • System Network Configuration Discovery: Internet Connection Discovery
                                  PID:5484
                              • C:\Windows\system32\OpenWith.exe
                                C:\Windows\system32\OpenWith.exe -Embedding
                                1⤵
                                • Suspicious behavior: GetForegroundWindowSpam
                                • Suspicious use of SetWindowsHookEx
                                PID:5756
                              • C:\Windows\system32\NOTEPAD.EXE
                                "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\setupV2\setupV2\setupV2\.ruff.txt
                                1⤵
                                  PID:5440
                                • C:\Users\Admin\Downloads\setupV2\setupV2\setupV2\setupV2.exe
                                  "C:\Users\Admin\Downloads\setupV2\setupV2\setupV2\setupV2.exe"
                                  1⤵
                                  • Loads dropped DLL
                                  • Maps connected drives based on registry
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:5380
                                  • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe
                                    "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=setupV2.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=5380.1884.173183309447213673
                                    2⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Checks system information in the registry
                                    • Drops file in Windows directory
                                    • Enumerates system info in registry
                                    • Modifies data under HKEY_USERS
                                    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                    • System policy modification
                                    PID:3092
                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.100 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=127.0.2651.98 --initial-client-data=0x160,0x164,0x168,0x13c,0x170,0x7ffcea04d198,0x7ffcea04d1a4,0x7ffcea04d1b0
                                      3⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:5864
                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView" --webview-exe-name=setupV2.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1768,i,2993715746634440210,9479102683692675169,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1712 /prefetch:2
                                      3⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:5752
                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView" --webview-exe-name=setupV2.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1816,i,2993715746634440210,9479102683692675169,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1912 /prefetch:11
                                      3⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:4396
                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView" --webview-exe-name=setupV2.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2192,i,2993715746634440210,9479102683692675169,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1504 /prefetch:13
                                      3⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:4524
                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView" --webview-exe-name=setupV2.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3456,i,2993715746634440210,9479102683692675169,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3468 /prefetch:1
                                      3⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:5984
                                    • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe
                                      "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView" --webview-exe-name=setupV2.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=4688,i,2993715746634440210,9479102683692675169,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=4668 /prefetch:1
                                      3⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      PID:1508
                                  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                    powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Downloads\setupV2\setupV2\setupV2\setupV2.exe\""
                                    2⤵
                                    • Command and Scripting Interpreter: PowerShell
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3392
                                    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\Downloads\setupV2\setupV2\setupV2\setupV2.exe
                                      3⤵
                                      • Command and Scripting Interpreter: PowerShell
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:3888
                                  • C:\Windows\System32\Wbem\wmic.exe
                                    wmic path win32_VideoController get name
                                    2⤵
                                    • Detects videocard installed
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:656
                                  • C:\Windows\system32\tasklist.exe
                                    tasklist
                                    2⤵
                                    • Enumerates processes with tasklist
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2428
                                  • C:\Windows\System32\Wbem\wmic.exe
                                    wmic csproduct get uuid
                                    2⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:760
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks /create /tn WinHost /tr C:\ProgramData\Microsoft\WinHost.exe /sc onstart /ru SYSTEM
                                    2⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:5416
                                  • C:\ProgramData\driver1.exe
                                    C:\ProgramData\driver1.exe
                                    2⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    PID:4240
                                    • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                      C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                      3⤵
                                      • Suspicious use of NtCreateUserProcessOtherParentProcess
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5836
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5836 -s 444
                                        4⤵
                                        • Program crash
                                        PID:2304
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 5836 -s 352
                                        4⤵
                                        • Program crash
                                        PID:4588
                                  • C:\Windows\system32\schtasks.exe
                                    schtasks /create /tn WinDriver /tr C:\ProgramData\Microsoft\WinDriver.exe /sc onstart /ru SYSTEM
                                    2⤵
                                    • Scheduled Task/Job: Scheduled Task
                                    PID:2008
                                • C:\Windows\system32\OpenWith.exe
                                  C:\Windows\system32\OpenWith.exe -Embedding
                                  1⤵
                                  • Suspicious use of SetWindowsHookEx
                                  PID:5184
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5836 -ip 5836
                                  1⤵
                                    PID:1560
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 5836 -ip 5836
                                    1⤵
                                      PID:6100
                                    • C:\Users\Admin\Downloads\setupV2\setupV2\setupV2\setupV2.exe
                                      "C:\Users\Admin\Downloads\setupV2\setupV2\setupV2\setupV2.exe"
                                      1⤵
                                      • Loads dropped DLL
                                      • Maps connected drives based on registry
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:5976
                                      • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe
                                        "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe" --embedded-browser-webview=1 --webview-exe-name=setupV2.exe --user-data-dir="C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView" --noerrdialogs --embedded-browser-webview-dpi-awareness=1 --disable-features=msSmartScreenProtection --enable-features=MojoIpcz --mojo-named-platform-channel-pipe=5976.5368.15234380702590541452
                                        2⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Checks system information in the registry
                                        • Drops file in Windows directory
                                        • Enumerates system info in registry
                                        • Modifies data under HKEY_USERS
                                        • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                        • System policy modification
                                        PID:5184
                                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe" --type=crashpad-handler --user-data-dir=C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Crashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.100 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe" --annotation=plat=Win64 "--annotation=prod=Edge WebView2" --annotation=ver=127.0.2651.98 --initial-client-data=0x164,0x168,0x16c,0x140,0x178,0x7ffcea04d198,0x7ffcea04d1a4,0x7ffcea04d1b0
                                          3⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          PID:5188
                                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe" --type=gpu-process --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView" --webview-exe-name=setupV2.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1796,i,16521214853209231465,10304702564105981623,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1792 /prefetch:2
                                          3⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          PID:2560
                                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView" --webview-exe-name=setupV2.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=1864,i,16521214853209231465,10304702564105981623,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=1912 /prefetch:11
                                          3⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          PID:4276
                                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView" --webview-exe-name=setupV2.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --field-trial-handle=2100,i,16521214853209231465,10304702564105981623,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=2200 /prefetch:13
                                          3⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          PID:1560
                                        • C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe
                                          "C:\Program Files (x86)\Microsoft\EdgeWebView\Application\127.0.2651.98\msedgewebview2.exe" --type=renderer --noerrdialogs --user-data-dir="C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView" --webview-exe-name=setupV2.exe --embedded-browser-webview=1 --embedded-browser-webview-dpi-awareness=1 --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --js-flags="--harmony-weak-refs-with-cleanup-some --expose-gc --ms-user-locale=" --field-trial-handle=3512,i,16521214853209231465,10304702564105981623,262144 --enable-features=MojoIpcz --disable-features=msSmartScreenProtection --variations-seed-version --mojo-platform-channel-handle=3720 /prefetch:1
                                          3⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          PID:5796
                                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                        powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\ProgramData\";" powershell -WindowStyle hidden -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Downloads\setupV2\setupV2\setupV2\setupV2.exe\""
                                        2⤵
                                        • Command and Scripting Interpreter: PowerShell
                                        • Suspicious behavior: EnumeratesProcesses
                                        PID:5736
                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle hidden -Command Add-MpPreference -ExclusionPath C:\Users\Admin\Downloads\setupV2\setupV2\setupV2\setupV2.exe
                                          3⤵
                                          • Command and Scripting Interpreter: PowerShell
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:3596
                                      • C:\Windows\System32\Wbem\wmic.exe
                                        wmic path win32_VideoController get name
                                        2⤵
                                        • Detects videocard installed
                                        PID:2068
                                      • C:\Windows\system32\tasklist.exe
                                        tasklist
                                        2⤵
                                        • Enumerates processes with tasklist
                                        PID:1860
                                      • C:\Windows\System32\Wbem\wmic.exe
                                        wmic csproduct get uuid
                                        2⤵
                                          PID:5748
                                        • C:\ProgramData\driver1.exe
                                          C:\ProgramData\driver1.exe
                                          2⤵
                                          • Executes dropped EXE
                                          PID:248
                                      • C:\Windows\system32\LogonUI.exe
                                        "LogonUI.exe" /flags:0x4 /state0:0xa3893855 /state1:0x41c64e6d
                                        1⤵
                                        • Modifies data under HKEY_USERS
                                        • Suspicious use of SetWindowsHookEx
                                        PID:5736

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Program Files (x86)\Microsoft\EdgeCore\127.0.2651.98\Installer\setup.exe

                                        Filesize

                                        6.6MB

                                        MD5

                                        527503f430c5fd4a542f8c0f163fde47

                                        SHA1

                                        6b4db644895df6c71b547d8b147ef3e327418f9d

                                        SHA256

                                        d1d9b6fa51141f58b95191c8a62cc5a4c9568ba4b70e3deba4e1929df9a97628

                                        SHA512

                                        ece940340ba2216966b6d4b28a950826b55f8987998c101c534331674376b148dfbfacaf5c78695944bf940dea07ed4887f9572e09c118e307752036679850b8

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\EdgeUpdate.dat

                                        Filesize

                                        12KB

                                        MD5

                                        369bbc37cff290adb8963dc5e518b9b8

                                        SHA1

                                        de0ef569f7ef55032e4b18d3a03542cc2bbac191

                                        SHA256

                                        3d7ec761bef1b1af418b909f1c81ce577c769722957713fdafbc8131b0a0c7d3

                                        SHA512

                                        4f8ec1fd4de8d373a4973513aa95e646dfc5b1069549fafe0d125614116c902bfc04b0e6afd12554cc13ca6c53e1f258a3b14e54ac811f6b06ed50c9ac9890b1

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\MicrosoftEdgeComRegisterShellARM64.exe

                                        Filesize

                                        182KB

                                        MD5

                                        b69894fc1c3f26c77b1826ef8b5a9fc5

                                        SHA1

                                        cff7b4299253beda53fb015408dd840db59901a1

                                        SHA256

                                        b91bad4c618eb6049b19364f62827470095e30519d07f4e0f2ccc387ddd5f1bf

                                        SHA512

                                        8361e97d84082f8e888262d0657bac47c152bd72f972628f446f58cbeacf37c05f484dce3fb0d38c4f0da2a2dcbb0813639d201d127ec7f072b942d43b216755

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\MicrosoftEdgeUpdate.exe

                                        Filesize

                                        201KB

                                        MD5

                                        136e8226d68856da40a4f60e70581b72

                                        SHA1

                                        6c1a09e12e3e07740feef7b209f673b06542ab62

                                        SHA256

                                        b4b8a2f87ee9c5f731189fe9f622cb9cd18fa3d55b0e8e0ae3c3a44a0833709f

                                        SHA512

                                        9a0215830e3f3a97e8b2cdcf1b98053ce266f0c6cb537942aec1f40e22627b60cb5bb499faece768481c41f7d851fcd5e10baa9534df25c419664407c6e5a399

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\MicrosoftEdgeUpdateComRegisterShell64.exe

                                        Filesize

                                        215KB

                                        MD5

                                        205590d4fb4b1914d2853ab7a9839ccf

                                        SHA1

                                        d9bbf8941df5993f72ffcf46beefcfcd88694ebd

                                        SHA256

                                        5f82471d58b6e700248d9602ce4a0a5cda4d2e2863ef1eb9fee4effcc07f3767

                                        SHA512

                                        bce1447d5d3210c22d52dec3b846db091b65ed03fd9d7cd11c6c4dbd2aa5a943d881360bc033c29abd61011581ff9354b35cbe421719d92568ed99997bfbbae8

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\MicrosoftEdgeUpdateCore.exe

                                        Filesize

                                        261KB

                                        MD5

                                        b07ab49ee8453853021c7dac2b2131db

                                        SHA1

                                        e1d87d6a6e7503d0d2b288ea5f034fe2f346196a

                                        SHA256

                                        f8535d5d73ebebed15adc6ae2ced6bb4889aa23e6ffe55faeabd961bf77b05e4

                                        SHA512

                                        5eaae533fbe71430ae2a717f7668fd0a26ec37624e198a32f09bfdbee7e3b6e93d64e4fbb78cbdb05c4fe390a864490ea997d11849ecd371f5153bc8bfafccc3

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\NOTICE.TXT

                                        Filesize

                                        4KB

                                        MD5

                                        6dd5bf0743f2366a0bdd37e302783bcd

                                        SHA1

                                        e5ff6e044c40c02b1fc78304804fe1f993fed2e6

                                        SHA256

                                        91d3fc490565ded7621ff5198960e501b6db857d5dd45af2fe7c3ecd141145f5

                                        SHA512

                                        f546c1dff8902a3353c0b7c10ca9f69bb77ebd276e4d5217da9e0823a0d8d506a5267773f789343d8c56b41a0ee6a97d4470a44bbd81ceaa8529e5e818f4951e

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdate.dll

                                        Filesize

                                        2.1MB

                                        MD5

                                        5d89123f9b96098d8fad74108bdd5f7e

                                        SHA1

                                        6309551b9656527563d2b2f3c335fd6805da0501

                                        SHA256

                                        03c3c918886e58f096aa8e919b1e9f8dcd5a9f2a4765971049bf8da305476f44

                                        SHA512

                                        9d8190e5374cd1b4adbbfb87c27fa40d4de529d7c0a20654e0ce189a4cb9a53d3708c4ce657a7a5469b015df7efbbff495fc844579d9cd363b329b7e007e85c8

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_af.dll

                                        Filesize

                                        29KB

                                        MD5

                                        4f860d5995ab77e6efa8f589a758c6d2

                                        SHA1

                                        07536839ccfd3c654ec5dc2161020f729973196d

                                        SHA256

                                        9841d787142dd54fea6b033bd897f05f3e617b48b051de0ee3cf5865b3393150

                                        SHA512

                                        0b9a661b76360f1fb2eb3ee25c6bf2cbab7ec74e2363e0af321dc4d0afb3cad301dddd16ea367d588451a40a2c2ed41f21d7afae48307e1e4a4ec5b24165b378

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_am.dll

                                        Filesize

                                        24KB

                                        MD5

                                        f624de37750fd191eb29d4de36818f8b

                                        SHA1

                                        b647dae9b9a3c673980afa651d73ce0a4985aae6

                                        SHA256

                                        e284453cd512e446fcbf9440013f8cb2348ffd6b1acec5366f2511cdf88b1794

                                        SHA512

                                        d1d65e29ed59e34d4ff66df11a2368f1a724730e32eb245022d4f3d1fadf16d445ba8532460afb0e6e91f8be60a7240d13577403193042d1e912a67e4bf23b1a

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_ar.dll

                                        Filesize

                                        26KB

                                        MD5

                                        5de3f4dabb5f033f24e29033142e7349

                                        SHA1

                                        5c446985de443501b545d75f6886a143c748b033

                                        SHA256

                                        2533d443b68c5288468b0b20cc3a70dc05f0498369d5321368a97dd5bf3268c8

                                        SHA512

                                        c96296e6f67edeff2be5dc03014a8eb65fc287fb899357d4608c36c07b4610827aa18cbec6ccd47b66230a12341af488aca8bd02632fa768f84ca7b1d9c9d065

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_as.dll

                                        Filesize

                                        29KB

                                        MD5

                                        1fb14c6c4fee7bfabe41badb7c5acff8

                                        SHA1

                                        953d94cd73951943db14c08cce37b2d3ac821b02

                                        SHA256

                                        cd32339fd7e4a5959e93eb5bfd6e009e4137e15c5e6c2e861d7891487216da49

                                        SHA512

                                        a93b081935fbe48fafa8071a9cd593ae7b19205c70eaf48c724397019a04161460c66d6d8c6ffd872f4d52a4a7aa25ba1cba04181b9ebaca04b76d111ea588d2

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_az.dll

                                        Filesize

                                        29KB

                                        MD5

                                        d3345579310f3bd080b406de47b2305f

                                        SHA1

                                        16aefb27ea6d81c684f041aa50ebb49fdd403d83

                                        SHA256

                                        b4ea3c63fa0104093a2b2034f950428e66d2cf3d55f0fc5bd688483392d60d69

                                        SHA512

                                        65e4aa8587bc579b5109d91e02745f6de96a23b6ac2962cdeb6d9d536b51abab12b2bbaeca72572c3ae1971dac5bd24430eb2ae5ccf44a7068427594e4afdd7a

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_bg.dll

                                        Filesize

                                        29KB

                                        MD5

                                        ecf3405e9e712d685ef1e8a5377296ea

                                        SHA1

                                        9872cdf450adf4257d77282a39b75822ce1c8375

                                        SHA256

                                        e400415638a7b7dcc28b14a257a28e93e423c396e89a02cba51623fdfbdc6b0b

                                        SHA512

                                        37e5f1b3bdd97a4370718dc2a46d78ab5b66865d3cdb66a20a7dc20a9d423ccde954c08f97e574fbab24e8dfa905351cbfb94bd3e6692a9b6526097ea3dc911d

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_bn-IN.dll

                                        Filesize

                                        29KB

                                        MD5

                                        051c429fa2beec9c2842c403a86c0e7b

                                        SHA1

                                        0a06a45200a1f5c81c48fbd2d03549fc9fac3a58

                                        SHA256

                                        1a8465922bbb05a97a24f6c2200fcc7afd8bd0ace245c2eda9d9d335d4fb9353

                                        SHA512

                                        bb59b41804328f27ba8861af32824266ca69ddcfdaaa11551b1edd4e129dbba630da8070abedb28e180045f8d0ddc1209cd901919f6b9aa421c457188af795c6

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_bn.dll

                                        Filesize

                                        29KB

                                        MD5

                                        82711e45d2b0764997abc1e0678a73bb

                                        SHA1

                                        47908e8885c86477a6f52eea5fddb005ec5b3fa3

                                        SHA256

                                        2bb7455999b8f53a2a0834588ca4da4703f4da362a127d01cc6bd60ca0303799

                                        SHA512

                                        4b517796edc954ab7f5a26a5d6605925dc7e84b611bcf59352b3b95f719cedc72c77a465fb1e7bc2d2f422d596c97968dac5b57292c82967d5cfaff980128fc2

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_bs.dll

                                        Filesize

                                        28KB

                                        MD5

                                        a0a1f791984f1de2f03a36171232d18d

                                        SHA1

                                        71f69d8fe47640ba9705725d7d627a05519c8016

                                        SHA256

                                        d2c7da8f4745b81874a9666c7d10a779a9956b4de0ebdaa1647bf78d4e17d85a

                                        SHA512

                                        a4267911846cd55eb91227b0117ccbfdf8ef6c4ed0b8935b08e5d41a91aeabd9259988c71da8606cfb2876c4d69df6ca5a246687440283f1625105624305eb33

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_ca-Es-VALENCIA.dll

                                        Filesize

                                        30KB

                                        MD5

                                        897712b508931dab76d39b209611740c

                                        SHA1

                                        9d80e07c2dc744e2efce3b67aa9876949fb9edfe

                                        SHA256

                                        ee64fdefdb3381ce61fc445190cc44b015e7b65a3a16d28f3477f68de6079f1b

                                        SHA512

                                        3329e37318dd9b11f282301e453af106168d3d10beff1ed62ffdcda60c6b4edb6b9c69ac6b9bb8abce3c9a9686a0152404524012dbff025e571de2cfcb3b5d56

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_ca.dll

                                        Filesize

                                        30KB

                                        MD5

                                        e90155442b28008992a7d899ca730222

                                        SHA1

                                        1d448e9709de0d301ded6d75caaeba4348a4793d

                                        SHA256

                                        6ae98b5e2eda22a0236434b7e952d732e3cd5d9cae2e51cd70222f1fd5278563

                                        SHA512

                                        a91d8357ca976db2eb5a081077304a50edc1b55b2775c00cfde05e03831f98bd04e43f0dba5b3efd5a6370afcb10b23bbf307412467502e9ef57e0beae636013

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_cs.dll

                                        Filesize

                                        28KB

                                        MD5

                                        1de961b662a374c3af918c18225f4364

                                        SHA1

                                        e8f1c438e57b322f43b4b851698bf38c129eb6ae

                                        SHA256

                                        bb1365c5770dacbb918af27b47b02f269504f4d2396cf3f82bf5ecb2551c5021

                                        SHA512

                                        c6bf62b684039f62744f1aab07f4751948e0c175f7fb7fe126f20903ce23fcdd2e284f1b794922621dae7eaa15c6dae0177ad102289a18f967721486f21073a1

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_cy.dll

                                        Filesize

                                        28KB

                                        MD5

                                        29f027d2d5fd486bdc20386ace925603

                                        SHA1

                                        66b8605f23871b4a8302bef0aaccb36ee1e72755

                                        SHA256

                                        03c8566f749e8fa349d97101849bc3b2cc0b7561b565a2b0928bf8fe901da813

                                        SHA512

                                        3348bdf10b2d964b34b791a774e28c97d3caf28d7f90e36b948cc2cb6c21e84cda933b7ddbd51c8fc604a450361cb834322c15ddbe0f4851154d05e5a2a2ea42

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_da.dll

                                        Filesize

                                        28KB

                                        MD5

                                        b0ae9aa0d5c17ee7abfc57d21cdcbae6

                                        SHA1

                                        01019eb6ba9c123be528136e12192b0bb33df407

                                        SHA256

                                        d10938919e3d28d71e8e3ba2d8e02e0f9dc2faf148cdedc21c166fd994c603e2

                                        SHA512

                                        4cba25c8159df865231b08fe650eedfb92d54c3037d28b2b9af010c8a59fa23669041a6c393622fe69b0194c2532f71f02b740f7e26e0bbf7ef34a421d6747b8

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_de.dll

                                        Filesize

                                        30KB

                                        MD5

                                        ad5b530eabff0540078c5d17f27b9610

                                        SHA1

                                        7e53dbbf64e70e561d37669e69f50eb0da8e37d1

                                        SHA256

                                        49f512316a51e51027b4e70de4ffe8c8ecb188e126439a90a5d12d52a0393966

                                        SHA512

                                        e1cc853d96589220676d39d91d4108633ce56304640f770e7d22b97a9b3be9452d5fb94e4e7fcd1400b62f0c398da8255c53a31853194a9e7b7784982b5ff40f

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_el.dll

                                        Filesize

                                        30KB

                                        MD5

                                        a7e64339a5314e3576c0d170171fa52a

                                        SHA1

                                        6c12aab6c97c30aff3245b78f7a3afeea604215e

                                        SHA256

                                        4e9ccecb8e4383395f2134347fbad00521345ec9c857d8fa102d5257c7bea9bf

                                        SHA512

                                        a4ca3fb60a7f4bda50847544dd1289d750f0d4b3565929290a8392b92822ef1856cec15a1f63f2c6fe1ef2e7cc0936a35bdb38ee5d904eb08cd32f05addc6ee4

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_en-GB.dll

                                        Filesize

                                        27KB

                                        MD5

                                        74d4cf3b8efb6cc3d0acc3eac38bd5b7

                                        SHA1

                                        9337803aadad9042c895b6f418b4c733b81221e0

                                        SHA256

                                        b83c8981d8835e4c78250bf265faa6d64693204b77764c8e349abc4365ae9871

                                        SHA512

                                        e6112ef60d56101aa16327042162d6ef43519bc56668ca8eaa7fd3e1aaadc75c7df75c1e41583a292ff1a9bdc7d9ad9f5c0d97fa84964532dca2d5f3df604c23

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_en.dll

                                        Filesize

                                        27KB

                                        MD5

                                        19dc1f6d1f309eb7abf1e0c8257f41f8

                                        SHA1

                                        e2d3e86fe22c6af6b8ee5b359315dfa6ac4d52ec

                                        SHA256

                                        046f6c532fcabd969c6e63bb7ee0d7a83d806fa659006508e1c3a9485190d6ef

                                        SHA512

                                        478d6a84452cfadc48547930e336ad459eec188dd3d9e4c778cded4ec3d34e00b2b8c0538366aa644ee67f878b29c5c73444c1406c66e8394761bb0979c6483c

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_es-419.dll

                                        Filesize

                                        29KB

                                        MD5

                                        8f7f515d78d2df371993fd70f863ab8d

                                        SHA1

                                        dfae1b47e80f91abf2d9c2aac009c0a1767bc59d

                                        SHA256

                                        ba57fbb9d3a32b84d6a76054b9ad180b6510e53206b9804bb9ea18ff73c2ae3e

                                        SHA512

                                        308a62af00a4410551eac967bb9f2cea7adf7c13b471dd28b276bda40b1e4c0b4ebb60aec29b6165069d40180bc45b4f5da5baddc374ce7bc5a5bb223afb4e96

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_es.dll

                                        Filesize

                                        29KB

                                        MD5

                                        6af05d448c842027f876e93f8ac58b65

                                        SHA1

                                        f34c988e3875a1d1b267b082476fcfb8d7505a73

                                        SHA256

                                        36876b14a214cf98dda5100a7e7134d7ebb78e895535d6bd7562099574607867

                                        SHA512

                                        412031db59de0367a102a026f73072244b33d726adc5bb9fd079db3dd37b5d6a24d7420a9811576d0a356933b5ba15cc9e2a92046d2d6e6d6fef37e9d840aec6

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_et.dll

                                        Filesize

                                        28KB

                                        MD5

                                        ae9bdf6416c3630c4b0b5b119308a135

                                        SHA1

                                        d7218c677b098d2a93cc91ead39c83d3a2c653b6

                                        SHA256

                                        62da90c9417a70632aa190fecc17c31ecf433c1f84f82b08d7d7290669cabf32

                                        SHA512

                                        4333ac6cd3737f25e6e1d429b195da781ced4340b89808cbd5d5d2aae2e79bcc700419d613123d632252e31ac44d95b7718f23da5b82ab5054407e80106a64a7

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_eu.dll

                                        Filesize

                                        28KB

                                        MD5

                                        fe73dbc305da6223d1e94e1cf548c000

                                        SHA1

                                        b16f2c40d68cd9718eaaa9b6db9c8e5c4b6acb9e

                                        SHA256

                                        1ef64088a613a4e10b4cf4206f95f5414ee27872798747234a6574b7e5c70a7d

                                        SHA512

                                        d9900720d89defffa52198dbe63515995095c94aa0cbbe4f32a1c09d26809cec480e92926d2240702604b8c13fcdc0032cc46910ade8e4c1d2fc9a4bd1b63858

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_fa.dll

                                        Filesize

                                        28KB

                                        MD5

                                        367ea715e942c81dd3cb734274969a0b

                                        SHA1

                                        f92f1ec2a5be9b775e67c4252a07c37ed0ca508b

                                        SHA256

                                        082da1c09782c026c9cd73456dc12539a226f0bf5d113e59bc93b29c1e98b37c

                                        SHA512

                                        c94e787ba3bdb56d1827a0477461cbba6b7cc68986722275e0d04ea7dc70db83b5d03887eec810bf9b67f70b18bd3c7b7d28f0e554938b81d3501bc11f97830a

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_fi.dll

                                        Filesize

                                        28KB

                                        MD5

                                        5a30bc4216af48a493eeb0f3a9f02607

                                        SHA1

                                        2fdf65a4002d91818d56a23fb8bfd08ab715002f

                                        SHA256

                                        5131c23915ad6b5b469bcbff31d0ae31ef34ded28ca0ffff9f1eb998bba98aa1

                                        SHA512

                                        34b3a4865f31ebdb8665780011b384ada768a0f71bff77f91706b140eb8cc07fff8787f710cdb1ee14a449cae8f22ee5fddadcc501cf1c921eea078e97dc2f89

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_fil.dll

                                        Filesize

                                        29KB

                                        MD5

                                        84c4736cf301b93998028ed7678caec1

                                        SHA1

                                        3b6f1f6b9eb3dd7d9a13c11dfd3ac56c93f1b10f

                                        SHA256

                                        3c8dcb7e982dac3159298009a86909b1e1000ccf6f4d333341f16d4d6fbd84ad

                                        SHA512

                                        5a1b77ef9450c32802e94e473a5b4e43e892c923ef368ee9bbbbb5b0090429320263cc79a4da0b281930c1a60861519211abd0bd67a9d9ee370bdda2230d2e81

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_fr-CA.dll

                                        Filesize

                                        30KB

                                        MD5

                                        8993c0784111fc7cd6a90a82303e5f44

                                        SHA1

                                        8d1ff2fed98ebc608604c555ceb46ca628afb285

                                        SHA256

                                        3d0ba88267018f592141ea86592757cf1ecaac1a3a18f99203e0fc5c5eacbd62

                                        SHA512

                                        124d16d848dc8ea0a93b292b10ce1fbad23b56b13771d904cf14c19d54478614d214441b05f6cd9e1999b8310fdd26d1c6ecae784be00aecee7e80c96ba4ac88

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_fr.dll

                                        Filesize

                                        30KB

                                        MD5

                                        a640aa4ff33662e06a474765df0b2a8d

                                        SHA1

                                        c6265225532e389e48c6057bd717b69de2125b61

                                        SHA256

                                        078b1943bf7f7955b90abc40f691b27e04376f8c43dd3abc4791614286cd4f23

                                        SHA512

                                        59791eef021f94efd9c18737d6c46fbc45add582eec92d5b997cfd66993abc7da872720a037766c3c70862f0654ccf30d122d4a5a6b305151bf8bf1c053a466d

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_ga.dll

                                        Filesize

                                        29KB

                                        MD5

                                        5bcc643a969559317d09a9c87f53d04e

                                        SHA1

                                        3602d51cde97de16d8c018225a39d505c803e0fc

                                        SHA256

                                        b48f57e90ea9db6d6a296c01e87f8db71e47ab05ab6c2a664cfa9f52cf1d2c18

                                        SHA512

                                        4c65772f77e61e64d572df5b1f62733aceb02a5c967c296b303ff17c5d49831e5b7fc3d662724ae3ae1e88cd0fdcb704e838af5d4ae20f2d82b9577f57159159

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_gd.dll

                                        Filesize

                                        30KB

                                        MD5

                                        aea23f526ef0c5bb3d2f8fdf192a49ea

                                        SHA1

                                        4d7695e33ed43c3efb95f304e29675ea885b2939

                                        SHA256

                                        3cfe866c151a7e8a208af725c0c6f2a47fc3ada35f9ad3509b16b8d5229318b9

                                        SHA512

                                        412e4742ebd46ce38010b4f6a46d8d524025f929ab4658040e271d768e79115d90903403b2f1e51ab910bbdf9677b49439eb3c8afc5959477af198efb0c7c3c9

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_gl.dll

                                        Filesize

                                        29KB

                                        MD5

                                        295cd30c00f43d9131621baf4859578f

                                        SHA1

                                        cab79a6263b7b0a799461f3e6df41f815029cded

                                        SHA256

                                        b851c5a60cb6d1e8dd9aa161106cba99ccea047d0b39d007beaa7b9ef4a83397

                                        SHA512

                                        5f5c1e62e6c0e11a63fad68928765e3f504f33cdbb1d9a05cd53cbc3ed145bf3528960a10e3d57e8c83b07c030c72257f403b9a57d12975d3ef8bc255418ad6c

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_gu.dll

                                        Filesize

                                        28KB

                                        MD5

                                        c43c1ab37cd93e54068443bc330fb3d2

                                        SHA1

                                        ab51a2cbc51b3c17cf184c6d99ac480c02eb63af

                                        SHA256

                                        0c26a367355e766402c31fbab102dd1c35300d4a1301417c75be5fc4b3d54680

                                        SHA512

                                        ff0193189fb846eb3c4188bb599dad8e6f415ec9612da567d95c9c513defb148b6013208371798d174569b46f443a744e4e8b83aaf139d68c31f7de0f94e63f9

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_hi.dll

                                        Filesize

                                        29KB

                                        MD5

                                        a5544f517f7c1bfd1ec6a2e355d5a84c

                                        SHA1

                                        34a2a4a576300ad55b6757171bcba0fab005daa5

                                        SHA256

                                        8274c64bb778b55d912929625cd849adfe733b2dd674d94895d53af8dfaabeca

                                        SHA512

                                        9069bcfb736e13499250844dddef40e2cf64937e33ee1f81fc4968f024f7d7b89c6a778866bf1bff98d770686569e4752a473c0adfad4d4099cceda84da3cac3

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_hr.dll

                                        Filesize

                                        29KB

                                        MD5

                                        c09876a180731c172fa2532f8be90a3d

                                        SHA1

                                        4359c7840ddb23142a40aff85129b9920360e954

                                        SHA256

                                        50fd548ea12e2b72fc563bc082b870a89a523e8b3a4a0e9b65fe673384da2b58

                                        SHA512

                                        91cee1b10fc12a01a2a285e67dba583d6f1bee0716cc89103fee0c7d0f52fadc0f9ac5b13e833834e7279963726950d3897847e7acac61857257fc031692033e

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_hu.dll

                                        Filesize

                                        29KB

                                        MD5

                                        ee19156c12d2d7cce9b12e515f9ac6c5

                                        SHA1

                                        19ad46e40b3c1cb6195231bfcf45bb68ee1b43bf

                                        SHA256

                                        c290883b4b99758792284755efa52c12eb09039f0f8027d8ba3b1d4bb2f3846f

                                        SHA512

                                        631364472a450519ad8959971d6c319610570ca37b4486ea12d6af5b46aaecbf336aadddd1f3fefba841534ff82adf905b1e1a008638ed784bf08870a3b86ee1

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_id.dll

                                        Filesize

                                        28KB

                                        MD5

                                        eacd4638369bf96ccc7c23af37e15b5d

                                        SHA1

                                        15c4878b78c06095981abcc589c4a6f265ef96a3

                                        SHA256

                                        a53c0fd74995090dbf48bbba4a00560e3cc344ce8120b8b2bfa1f9b953b536ef

                                        SHA512

                                        19cc8d25bd8fd84481f77d301f79636208df5807647ddc6cb6beff3882d94672db49daa4ddfff0c334b584742f9d2fea3af73977032d7dfccd0cfd1314af4ae6

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_is.dll

                                        Filesize

                                        28KB

                                        MD5

                                        19d44de8f930e07f41f9343478ed5c1d

                                        SHA1

                                        83ee0c5a86997dd491bd8312d221dde2b2e7d44a

                                        SHA256

                                        69d3a21b7723e4df8b7b97e39493081e41231e2d3a3f5a4de462db41339987ec

                                        SHA512

                                        4edb82aedfeca743a03815a889eca766fec8083afd0defa098593297a52edaf1780dbd5ad1d3325c614d815d34d8c57ec2283a0db215f94f42819f1890089c4a

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_it.dll

                                        Filesize

                                        30KB

                                        MD5

                                        26cbb965c6976f59ac385ef9408bf81a

                                        SHA1

                                        16bb0530338e600fdfd13a7b03523a715e633bcb

                                        SHA256

                                        bed996b25f77c7d4328d96147ed388f1b457abfc0510eb8956be4339d103821a

                                        SHA512

                                        1efb1bdf0276de17f8516cde4d435e0be8fd066f52fb5d4c9e2fe2e17a135296ab6b34f523284941beae438e97d7e65de26f0541b7c437bceff229b60da4bb0d

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_iw.dll

                                        Filesize

                                        25KB

                                        MD5

                                        98f79d77ab05304bba8d60e50914418f

                                        SHA1

                                        957590adc0f8a7274e765e2a804c1de7c76e3040

                                        SHA256

                                        3764941b873ed59d5bc1097f6b9382ba59c06d443a96ff71ba6b693f161da522

                                        SHA512

                                        9ca6af5c14193dce7b50251f1b9205870435e60b5495ab1a9f0d42ca14b98b78fef51bf3cd4165394ca5ba28d0e98bea7642ec67039c0f146383136145c7de59

                                      • C:\Program Files (x86)\Microsoft\Temp\EU4011.tmp\msedgeupdateres_ja.dll

                                        Filesize

                                        24KB

                                        MD5

                                        b89ba9ecc6d4c77abff61b1c75fff16c

                                        SHA1

                                        f381408f26be2c77c7b59681ad6280a701ccb472

                                        SHA256

                                        bbd2c970f747a6ee8e4735939225f607ae630ddc6e2e39954e0300ca9a7a88b2

                                        SHA512

                                        53a3db82f4cf5a300a5eab7692f4084451b987ad72ae24d9118d80f18692ac3604981c0e871c7a7625c5153803aea0e093d91822d33af0c10a07bcb6e766a5b6

                                      • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                        Filesize

                                        15KB

                                        MD5

                                        f90243b91808ed40a8d6a17df6dab682

                                        SHA1

                                        29aa6b5cbfa46b6c46a9474ef1b515d51c682b31

                                        SHA256

                                        09b9ad09c353b38f9ab38c83ff9e5d2444b1b409156fb563993a26824dcb387f

                                        SHA512

                                        a9b8d10bbcc839ac9e88dc6538b3a74494c0e72726cd408fb6883f906014df6ee8d6c646a02dbc092c1db426f2e9f7b84efe62d162d7e1fbec7bc04164ce9513

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        3e2612636cf368bc811fdc8db09e037d

                                        SHA1

                                        d69e34379f97e35083f4c4ea1249e6f1a5f51d56

                                        SHA256

                                        2eecaacf3f2582e202689a16b0ac1715c628d32f54261671cf67ba6abbf6c9f9

                                        SHA512

                                        b3cc3bf967d014f522e6811448c4792eed730e72547f83eb4974e832e958deb7e7f4c3ce8e0ed6f9c110525d0b12f7fe7ab80a914c2fe492e1f2d321ef47f96d

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                        Filesize

                                        152B

                                        MD5

                                        e8115549491cca16e7bfdfec9db7f89a

                                        SHA1

                                        d1eb5c8263cbe146cd88953bb9886c3aeb262742

                                        SHA256

                                        dfa9a8b54936607a5250bec0ed3e2a24f96f4929ca550115a91d0d5d68e4d08e

                                        SHA512

                                        851207c15de3531bd230baf02a8a96550b81649ccbdd44ad74875d97a700271ef96e8be6e1c95b2a0119561aee24729cb55c29eb0b3455473688ef9132ed7f54

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                        Filesize

                                        2KB

                                        MD5

                                        262651711fcc914d48cbb3702b3a9216

                                        SHA1

                                        78ba37bee79be6a1bbf86dbab77ee8cd6df99a04

                                        SHA256

                                        1f516356b3ed828c554f341b2c71ecfb33bea206d2a2601069510c2f85ea93ed

                                        SHA512

                                        f54779e2a7b6aab5d7f4803c45355afb404a0d4e4b3b24a0f6967b26ffd9a1dcb57cc5133680da6c67aac78f07b2554ed11b75878f70c129294deec4fee507c9

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                        Filesize

                                        111B

                                        MD5

                                        285252a2f6327d41eab203dc2f402c67

                                        SHA1

                                        acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                        SHA256

                                        5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                        SHA512

                                        11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                        Filesize

                                        595B

                                        MD5

                                        38814757bed1b394fc225f44c1384214

                                        SHA1

                                        5c0405a2964d8b5ea3736d4c3f182d97bf7ead67

                                        SHA256

                                        0aca0d43c630d3477c5f6e619a56e1841ee38d8ac699270935615d1fb06af69e

                                        SHA512

                                        65a80226f2be9fd62d40d1d321a489839bdcff093d40e6e67860a01a6ea4bbfc33e435218cdbaefcd8ef62514540d83a81043280d659bea85e3c1828af52f45c

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        5KB

                                        MD5

                                        9848203e34f471d448a4b5ab0d19d071

                                        SHA1

                                        39c48bb8795dca72e53156761cbf5daf7f7a3cc8

                                        SHA256

                                        f3420e6a97117845bd4bb328fdbd75175df52d67af3ae8bb3ae0d50f5b3d8a80

                                        SHA512

                                        1bde40c21a234f2c177dc06e05276377b4c4503a2a371bd2dafd4f031fb99cfbc149c73848af545a563a82eb25deb218ace6726973b9fcc10d8a63414c14171d

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        6672cd69022a6f509f677757605d0f76

                                        SHA1

                                        e58bdd41bebefe63c046ab0c78130b5457604928

                                        SHA256

                                        aab5975429ea85431aaaa9fbf17a94374577b5d262e6d5ac2a8eb034961a1268

                                        SHA512

                                        e2c4c529b6f738cc82bc43521455f727a914b949bbd4e5a86b00955a7562b263e7e3a84f41b80722d4734b581332f9f0462644b372448541ae8617253c6e5490

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

                                        Filesize

                                        1KB

                                        MD5

                                        5d106879d0b16d76a87ba4241ecf91d4

                                        SHA1

                                        0fb472b8a4e34ed0e8edf807f638b31e45e9b0d3

                                        SHA256

                                        c8645b33d5d9afa94f830d662f739e85163cfd363f36d3f91f0a54e6b1129b88

                                        SHA512

                                        c989d30c761f6e9f504f70edb0f906ab80c0c025f317d7523aadc04dcd52387dac1d6fa4065eaefa020ca5651c584d1b33a8c205861a2b66a84cd4bcd70711aa

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe57cfd3.TMP

                                        Filesize

                                        1KB

                                        MD5

                                        f739844780476f7e84a78150ca37de9f

                                        SHA1

                                        c9ab23df00d9de5cbb4a0ae945ed0be19105f675

                                        SHA256

                                        7c87d36e2b4dca87695aa6a82872c71ac27c97ab73e9cb7d0128d71962a810ec

                                        SHA512

                                        b5bb0ef4d5ad7b889652c01e797ac340d5e71ffc44b8fb70143effc0ec64fcc7feb6541c1dd3373a74cf80a3f289d44aa3195b437660c3e6014ce42f06603c5b

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        46295cac801e5d4857d09837238a6394

                                        SHA1

                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                        SHA256

                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                        SHA512

                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                        Filesize

                                        16B

                                        MD5

                                        206702161f94c5cd39fadd03f4014d98

                                        SHA1

                                        bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                        SHA256

                                        1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                        SHA512

                                        0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        10KB

                                        MD5

                                        38deb1bc4f0415d2f099c36c2a2fc623

                                        SHA1

                                        405ff02e5322a2ce11bdc72b46948430b8ecfad0

                                        SHA256

                                        12968b644ae312f2b753da6d5a7641ca6f7861be0b2033fc78742dbaef8d0b1b

                                        SHA512

                                        e013519255d20d9890e0137d127d64e43fe40b62a6263a5a17d22d90c7089bb7ad527a8eceffbcb06787dda937bb88186fef444a08edbdc663fac57aaf375e54

                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                        Filesize

                                        11KB

                                        MD5

                                        e6cba98c28b3a1306239d6e9e61209b1

                                        SHA1

                                        ba743d2cc545b32501158cd5c8bc01eb1a18d4b8

                                        SHA256

                                        6b650208144cbf0dccaf05bb19d94e139e8c724ddcc2f9b82b44fcf756dc99c5

                                        SHA512

                                        c0be1d4ab37c3075af37e15933ebb42af149a5a39da2fba35eefd5f86007f1e0d39cc27fa0c51d981859238dfd682925160a288cce1fba1f29802b1e36ef5873

                                      • C:\Users\Admin\AppData\Local\Temp\MicrosoftEdgeWebview2Setup.exe

                                        Filesize

                                        1.6MB

                                        MD5

                                        45e5ca74b9ae3c3fc6f6a63c609783b6

                                        SHA1

                                        f36715bea96d69bb18075fac30b90502c6d2464b

                                        SHA256

                                        b4afd37b9087df7e041ae749fd0fa342926d9cce533bde9cdc4283132c3820a9

                                        SHA512

                                        014fd398d456fcb118dfd6b038b6f96008ca209d44d9707e175e85e7f14cfb3f2886deaed0d8ed25971813035e8dd7f88142c06972f3e2c9b4a534d84bec661a

                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nmgdkufu.vc1.ps1

                                        Filesize

                                        60B

                                        MD5

                                        d17fe0a3f47be24a6453e9ef58c94641

                                        SHA1

                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                        SHA256

                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                        SHA512

                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Crashpad\settings.dat

                                        Filesize

                                        280B

                                        MD5

                                        606ca63c137c4f24bfd2e0c0dfa018c7

                                        SHA1

                                        b40a40bd9c5b955df81ef1590478353f309bcc82

                                        SHA256

                                        fc219b04c854fc1329ef8f1cf820c8ed9a598a15542c60814d08a304a6be840e

                                        SHA512

                                        dd695473baa51966c61996cbbf7cb189a557394234688cba710ea8ef3a7cf89f67d643900373fecc0baf4d7ed321b6ea9e30b2105cf64b6aaf82630d0e9ba7cd

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Crashpad\settings.dat

                                        Filesize

                                        280B

                                        MD5

                                        d5e15fd0f7c46019dba5df2babab1bdf

                                        SHA1

                                        1746fb31e39a3ae3a618e1445274c20e25c296ed

                                        SHA256

                                        d7b50816370911c49d1f73ef1f4358ec3e6a389e685d5627efedc83d5f8595ae

                                        SHA512

                                        a9f857d6792097d5b6deab237c725ef67f9971d74f7c4d46266162cf96ccc3e14bbe71aadc4903913463ae0f80d01aae0b75489084880ce0822733f243a6107c

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Crashpad\settings.dat

                                        Filesize

                                        280B

                                        MD5

                                        1b5d43d28df921290c32897aa26170d4

                                        SHA1

                                        066e3c5c6dc2c22f4c07dcacf794fde91c24d2b4

                                        SHA256

                                        e40d65ab70325701daaa662a7ab37c7ecb1e5f80bb9d9568585141886fb3b107

                                        SHA512

                                        0616f4ef4d30e7dbb972f2c2decc8ef44fd1d619875d43ae2ca405506ea2059ab94a074fa18cba496c08c4e58a67b7a850317629bf2ce6ffd21a3f0782bd48e7

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index

                                        Filesize

                                        96B

                                        MD5

                                        c63f499711ceb09288b4bf2abe79b91f

                                        SHA1

                                        4aa311ca2045dbe2edbdf96a275dfcc5ef608070

                                        SHA256

                                        5598febd745692c2a5e4edef63599c81559c12c179f7af9cd6c6ba86e7ee03f1

                                        SHA512

                                        918bceb576ca49e3252baada27d437f210e27bf30919ae4eea87d4f07b8a9bfe2f61ccb27ce792aa9d530aa60495f39285a028fea74c3a2219334069da8d80da

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Default\Code Cache\js\index-dir\the-real-index~RFe59477f.TMP

                                        Filesize

                                        48B

                                        MD5

                                        b9b355a646e7e1be0492e41201e02b8c

                                        SHA1

                                        d62d1d80587124f6ac84be83a30a9aa7c135df83

                                        SHA256

                                        e60bad8bf53fac256544f7e4e2bd63f4c12d0ab68cd3bdcced07c19f7db15283

                                        SHA512

                                        7b3ab07c8c3b1f93b15a08b50a44b0c793e03fb75388647aeb49683a83065cfd375075503908c3d4228b022fe4003f278b45092e89fd64acdc7b59bad55f5c72

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Default\Extension Rules\MANIFEST-000001

                                        Filesize

                                        41B

                                        MD5

                                        5af87dfd673ba2115e2fcf5cfdb727ab

                                        SHA1

                                        d5b5bbf396dc291274584ef71f444f420b6056f1

                                        SHA256

                                        f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                        SHA512

                                        de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Default\Network\947659f7-7522-4d25-9dfe-a5e061e58adb.tmp

                                        Filesize

                                        2B

                                        MD5

                                        d751713988987e9331980363e24189ce

                                        SHA1

                                        97d170e1550eee4afc0af065b78cda302a97674c

                                        SHA256

                                        4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                        SHA512

                                        b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Default\Network\Network Persistent State~RFe595f9b.TMP

                                        Filesize

                                        59B

                                        MD5

                                        2800881c775077e1c4b6e06bf4676de4

                                        SHA1

                                        2873631068c8b3b9495638c865915be822442c8b

                                        SHA256

                                        226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974

                                        SHA512

                                        e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Default\Network\f75dd3ee-96a2-4f5c-a4e9-778459acbe45.tmp

                                        Filesize

                                        40B

                                        MD5

                                        20d4b8fa017a12a108c87f540836e250

                                        SHA1

                                        1ac617fac131262b6d3ce1f52f5907e31d5f6f00

                                        SHA256

                                        6028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d

                                        SHA512

                                        507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        ffc21350e49f743623c169be5cdaa714

                                        SHA1

                                        15c6d544cf007aaf8531abd23dff206b24853c81

                                        SHA256

                                        7c1c5aedea9c98a275d983ec927b06a35ec477065ca1d197c550768935e1190c

                                        SHA512

                                        ca12edf43b52e86e82eb43cf738add15aaebc3d3c41482fd416f4b8f0608f404556823b633421c38c49444bea20a6f4afc4d8181bacd2bf179463deb08f40abf

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Default\Preferences

                                        Filesize

                                        6KB

                                        MD5

                                        aa5b509a2b89b3a33d58de27f11c7372

                                        SHA1

                                        13ba718b5234daee21984c2b297ba20a88a406e1

                                        SHA256

                                        0de2357879317ca90a841ee175acff88e2e3de0fc14475a19065bf828311801f

                                        SHA512

                                        dabf74a24c985e1fe84ff648bec8da0592209c316231f1451071b34f00b4749b2a617e6791b6c803d7e539113314c8e078ca85e527e23768c7aceb3f4dac96aa

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Default\c14b26b1-185b-46ab-877d-cbcd8731c2fb.tmp

                                        Filesize

                                        6KB

                                        MD5

                                        508971ef4f46fe662245acdb94cf6c2c

                                        SHA1

                                        34540e823a2c5b0f3c55d1de7d9d4e6735afe749

                                        SHA256

                                        9becbf62d5d3d63d50f66fd4a5b92587ea99efaa9e5c3d6d76d11c3f07d6c9b5

                                        SHA512

                                        396550074877357d577f94248860084c7fdb56871de7c606e389ed0fa510f3095765ad8e326afea76c8df5d8e7c025dc35c3cee9298e01132ead9790c55b1f08

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\GrShaderCache\data_2

                                        Filesize

                                        8KB

                                        MD5

                                        0962291d6d367570bee5454721c17e11

                                        SHA1

                                        59d10a893ef321a706a9255176761366115bedcb

                                        SHA256

                                        ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7

                                        SHA512

                                        f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\GraphiteDawnCache\data_0

                                        Filesize

                                        8KB

                                        MD5

                                        cf89d16bb9107c631daabf0c0ee58efb

                                        SHA1

                                        3ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b

                                        SHA256

                                        d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e

                                        SHA512

                                        8cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\GraphiteDawnCache\data_1

                                        Filesize

                                        264KB

                                        MD5

                                        d0d388f3865d0523e451d6ba0be34cc4

                                        SHA1

                                        8571c6a52aacc2747c048e3419e5657b74612995

                                        SHA256

                                        902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b

                                        SHA512

                                        376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\GraphiteDawnCache\data_3

                                        Filesize

                                        8KB

                                        MD5

                                        41876349cb12d6db992f1309f22df3f0

                                        SHA1

                                        5cf26b3420fc0302cd0a71e8d029739b8765be27

                                        SHA256

                                        e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c

                                        SHA512

                                        e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Local State

                                        Filesize

                                        16KB

                                        MD5

                                        4ab66e50964e29e11586b2dc35173ff7

                                        SHA1

                                        8d2a5966e588e0ded4ef1ccfdfeb1b4fc88a3b12

                                        SHA256

                                        3f8331ac9c0679e9254643e8fba0bd17d3eccb9a3260812896cbd4e324961f03

                                        SHA512

                                        b68691186cfc5f601ea7837aa31563bd72411223ad7ce11ae1a1a14592a5c9145163d906a7d2cabd9d6d6f39fc3110edb63da3e8687ac9949b710b539b21e87d

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Local State

                                        Filesize

                                        17KB

                                        MD5

                                        08f261ee190458d52eba8672d64ce504

                                        SHA1

                                        6140d5f5ba7b3a56d2275fb3eff551b956487f75

                                        SHA256

                                        c7dede2b9a73b800d6f6db0453298b7e9783fb7880b2ea932c2fca37d897442d

                                        SHA512

                                        f40bbbbe3b2f036d4afdbdc96329240e9b55107e7acf175428c85c45cb85d4e52813b85ee0943f66c4f2b08da2f805ef26d0654b0068be6c5f4782b814b460f4

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Local State

                                        Filesize

                                        1KB

                                        MD5

                                        e582255a1990a24f55cb766d03a967a3

                                        SHA1

                                        7d9d4f68da37c41a63fec4d773a90278528810a4

                                        SHA256

                                        22cd6f95cbb180f3570af5dde46b794f28be3f69c5d27a0d8d8c9e29277bbf96

                                        SHA512

                                        3df83d9730bebc6ffdbac2d6e17e38ab029d18e4bdf43cc362b2b9b328fe0c5dc58186556a5c8643e57d3c7eeb4f9e7c5aff0956641c559007b80af669a5567f

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Local State

                                        Filesize

                                        2KB

                                        MD5

                                        c16881eecacc214d19ad6ca6e9ffb813

                                        SHA1

                                        123b7e5e3aeda5412307a29b4c410052b8887274

                                        SHA256

                                        e78adcd338b2cde1e174ca149cbb54fd965c0a27ce4a550e840c0d7550da2b51

                                        SHA512

                                        fc4153aedd106df1995a40976ba93926fef1cd4a950097f60d1abb2b1fd28506fb9829b32e8f8a4e4c1453f9e1f13cc47533e4d5650c724b58a026fadbea9f7a

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Local State

                                        Filesize

                                        3KB

                                        MD5

                                        e08aa52df9a98c44a7aa6b609710112e

                                        SHA1

                                        be88315d65544047df8d97225abf0873e6cc44f4

                                        SHA256

                                        c38176bb3abf0a102ad7fa6fdf907ab9e00e6444f107966758e0b40c391072fd

                                        SHA512

                                        5f7aea80fe770f87123441879dbbb910ccd978d7b15e3a4d52ad4c1ba1003e2bbcae71f13bc7022cdba7eac542bbe4aa2f2371e21e8afd785fba61a23c12590f

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Local State

                                        Filesize

                                        17KB

                                        MD5

                                        639a6c19918cf97cfcaf564e01ea68e5

                                        SHA1

                                        c25510d758a5b5788f0b7204c8419c97f9959529

                                        SHA256

                                        a4aaeedcab193efda960891875ac8ef7040a198ff55bac2f33c41a26babfbdbb

                                        SHA512

                                        ee5ff9052d28d2e3385fe2a62b5d5e6f7b8f5f9a09a1f1bce2bd05e33943a4f9fbad35f3c49b255d1520b6174370090c27742727d1c379a9db76dbf08e9768cf

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Local State

                                        Filesize

                                        16KB

                                        MD5

                                        02fa16b6f0987c9d183533fc70cc7a62

                                        SHA1

                                        502d15ae8adfb61a84b8ab03de890e7dc4a29a7c

                                        SHA256

                                        fa189182954d6f17b68b1330bbe00c9597ba84c01333865541606f2b2c5cc629

                                        SHA512

                                        bc7cefef4988418388cd29e67b54a6f60158e1ad5f5ca121632087d2b8f7a34ab943bc2f71dadf44966dd918c3abd25514847abb82229edfb1c7bda5aaf4a6fc

                                      • C:\Users\Admin\AppData\Roaming\setupV2.exe\EBWebView\Local State~RFe58f6de.TMP

                                        Filesize

                                        1KB

                                        MD5

                                        b7ed16a00fb41d889932b778ab1ff183

                                        SHA1

                                        f31b6f889d2001fcffa469bcc5d3ca3ebee05275

                                        SHA256

                                        03a18e9da66da183f38a9f703c289792fcc64e146726f814d136a423ff571de0

                                        SHA512

                                        44172b1e0772b515e64b947a57c38df337f3164dbac680fac9d04f35728341c1361a648f1155b37303b18d57145af96033fd0a7a4e9ccd73393042656abada93

                                      • C:\Users\Admin\Downloads\Unconfirmed 660011.crdownload

                                        Filesize

                                        17.3MB

                                        MD5

                                        e9ec9aa202ed23be22c6bcd7f400ebc5

                                        SHA1

                                        2bdb0746307ba6ea17404dc3e7346288c02ed626

                                        SHA256

                                        5f1000790e7babfccf856ebf80f4217730a3a3788a19fcd8aae3db6b13aeb20d

                                        SHA512

                                        75c68a819983a4e076d120ac4081be172c05129a52e7360bc0be71a04ce9fb42ee0fbab2cb345057ab9de523b10b170412507e1bdfd1545e1a84bfda17d038c8

                                      • C:\Users\Admin\Downloads\setupV2.zip:Zone.Identifier

                                        Filesize

                                        26B

                                        MD5

                                        fbccf14d504b7b2dbcb5a5bda75bd93b

                                        SHA1

                                        d59fc84cdd5217c6cf74785703655f78da6b582b

                                        SHA256

                                        eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                        SHA512

                                        aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                      • C:\Windows\SystemTemp\MsEdgeCrashpad\settings.dat

                                        Filesize

                                        280B

                                        MD5

                                        0bc2f63094b6c06056f517facdab0e0b

                                        SHA1

                                        a5b44909bb402beab70cd122b53bbbd00c4c50ad

                                        SHA256

                                        12e98983f64e66a4adc20029ec5f92f4d1385d57fc895d1978f2f78db541c2b2

                                        SHA512

                                        3dea39bbecbb58c9009652c6cb435d42c12829de711396cd26cb76e8e20e81774ba467072e445ef0a118d2b9e0780c10a6b4ad912ea6aeba4e92f5c53df6149c

                                      • \??\pipe\LOCAL\crashpad_2432_EATJPBQVXQUZLYCB

                                        MD5

                                        d41d8cd98f00b204e9800998ecf8427e

                                        SHA1

                                        da39a3ee5e6b4b0d3255bfef95601890afd80709

                                        SHA256

                                        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                        SHA512

                                        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                      • memory/248-1132-0x00007FF624380000-0x00007FF624EDD000-memory.dmp

                                        Filesize

                                        11.4MB

                                      • memory/2096-525-0x0000000074E20000-0x0000000075045000-memory.dmp

                                        Filesize

                                        2.1MB

                                      • memory/2096-456-0x0000000074E20000-0x0000000075045000-memory.dmp

                                        Filesize

                                        2.1MB

                                      • memory/2096-789-0x0000000000520000-0x0000000000555000-memory.dmp

                                        Filesize

                                        212KB

                                      • memory/2096-455-0x0000000000520000-0x0000000000555000-memory.dmp

                                        Filesize

                                        212KB

                                      • memory/3392-674-0x00000220477D0000-0x00000220477F2000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/4240-765-0x00007FF706110000-0x00007FF706C6D000-memory.dmp

                                        Filesize

                                        11.4MB

                                      • memory/5144-780-0x0000000000C10000-0x0000000000C19000-memory.dmp

                                        Filesize

                                        36KB

                                      • memory/5144-782-0x00000000029E0000-0x0000000002DE0000-memory.dmp

                                        Filesize

                                        4.0MB

                                      • memory/5144-785-0x00000000769E0000-0x0000000076C32000-memory.dmp

                                        Filesize

                                        2.3MB

                                      • memory/5144-783-0x00007FFD0E820000-0x00007FFD0EA29000-memory.dmp

                                        Filesize

                                        2.0MB

                                      • memory/5752-556-0x00007FFD0D280000-0x00007FFD0D281000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/5836-776-0x0000000003C10000-0x0000000004010000-memory.dmp

                                        Filesize

                                        4.0MB

                                      • memory/5836-775-0x0000000003C10000-0x0000000004010000-memory.dmp

                                        Filesize

                                        4.0MB

                                      • memory/5836-763-0x0000000000E00000-0x0000000000E7E000-memory.dmp

                                        Filesize

                                        504KB

                                      • memory/5836-777-0x00007FFD0E820000-0x00007FFD0EA29000-memory.dmp

                                        Filesize

                                        2.0MB

                                      • memory/5836-764-0x0000000000E00000-0x0000000000E7E000-memory.dmp

                                        Filesize

                                        504KB

                                      • memory/5836-779-0x00000000769E0000-0x0000000076C32000-memory.dmp

                                        Filesize

                                        2.3MB

                                      • memory/5984-646-0x00007FFD0D280000-0x00007FFD0D281000-memory.dmp

                                        Filesize

                                        4KB