Analysis

  • max time kernel
    285s
  • max time network
    413s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-12-2023 00:19

General

  • Target

    Nitro by Gabriel/Nitro Generator.exe

  • Size

    17.1MB

  • MD5

    bb64387766b55fe98c73767ad9076686

  • SHA1

    e053872b961382c95e5c58d035b50b52d34803b1

  • SHA256

    a5cd667a686d3140aef60b4d11679491751a24adace845c04a65f9db84483488

  • SHA512

    e77cdf900a430616aa99eea4fa56737c7dade78381de68e17471e14b366fb8f1faee867ef1ebc22e753b70fa166e592e9281e8e47c5be63184ae61db8b90707c

  • SSDEEP

    393216:3u7L/sQbo3pUTLfhJjdQuslSl99oWOv+9fPjMb6Y5/n:3CL0QbaUTLJRdQu9DorvSHjy6Yp

Malware Config

Signatures

  • Modifies Installed Components in the registry 2 TTPs 15 IoCs
  • Drops startup file 1 IoCs
  • Loads dropped DLL 48 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Enumerates connected drives 3 TTPs 30 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\werfault.exe
    werfault.exe /h /shared Global\5928f1e3942e47ce981f479c34b3d23c /t 3412 /p 3308
    1⤵
      PID:1176
    • C:\Users\Admin\AppData\Local\Temp\Nitro by Gabriel\Nitro Generator.exe
      "C:\Users\Admin\AppData\Local\Temp\Nitro by Gabriel\Nitro Generator.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4628
      • C:\Users\Admin\AppData\Local\Temp\Nitro by Gabriel\Nitro Generator.exe
        "C:\Users\Admin\AppData\Local\Temp\Nitro by Gabriel\Nitro Generator.exe"
        2⤵
        • Drops startup file
        • Loads dropped DLL
        PID:4196
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "ver"
          3⤵
            PID:4456
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c "tasklist"
            3⤵
              PID:5296
              • C:\Windows\system32\tasklist.exe
                tasklist
                4⤵
                • Enumerates processes with tasklist
                • Suspicious use of AdjustPrivilegeToken
                PID:6480
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe"
          1⤵
          • Checks processor information in registry
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:636
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="636.0.1631435146\1333977676" -parentBuildID 20221007134813 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 20749 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fd883666-3a14-4076-8001-7689a79af609} 636 "\\.\pipe\gecko-crash-server-pipe.636" 2012 191473d8858 gpu
            2⤵
              PID:4624
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="636.1.1657423849\663923645" -parentBuildID 20221007134813 -prefsHandle 2400 -prefMapHandle 2388 -prefsLen 20785 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fb9d1f2f-cf19-485a-ab9e-cbde6ccc1dba} 636 "\\.\pipe\gecko-crash-server-pipe.636" 2412 19147306258 socket
              2⤵
                PID:1128
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="636.2.108178717\1569074996" -childID 1 -isForBrowser -prefsHandle 3420 -prefMapHandle 3416 -prefsLen 20888 -prefMapSize 233444 -jsInitHandle 1304 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {55504c2f-04cb-465b-8ca2-f1713a6e90b9} 636 "\\.\pipe\gecko-crash-server-pipe.636" 3432 1914b17cd58 tab
                2⤵
                  PID:2008
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="636.3.1307853744\854102859" -childID 2 -isForBrowser -prefsHandle 2920 -prefMapHandle 3268 -prefsLen 26331 -prefMapSize 233444 -jsInitHandle 1304 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce99a060-49b6-4ca0-aba0-b6270d65c0ec} 636 "\\.\pipe\gecko-crash-server-pipe.636" 3600 19147305058 tab
                  2⤵
                    PID:5796
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="636.4.1229263983\1313261922" -childID 3 -isForBrowser -prefsHandle 3612 -prefMapHandle 3608 -prefsLen 26331 -prefMapSize 233444 -jsInitHandle 1304 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {205de2b7-5295-4a52-a7e5-ec079e2ea28b} 636 "\\.\pipe\gecko-crash-server-pipe.636" 3652 1914b771b58 tab
                    2⤵
                      PID:5804
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="636.6.1038653572\1652585038" -childID 5 -isForBrowser -prefsHandle 4600 -prefMapHandle 4596 -prefsLen 26390 -prefMapSize 233444 -jsInitHandle 1304 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {536cdbf6-e454-448c-b89e-a479f3e3fffa} 636 "\\.\pipe\gecko-crash-server-pipe.636" 4624 19149a06858 tab
                      2⤵
                        PID:2208
                      • C:\Program Files\Mozilla Firefox\firefox.exe
                        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="636.5.1037230026\626554988" -childID 4 -isForBrowser -prefsHandle 4580 -prefMapHandle 4520 -prefsLen 26390 -prefMapSize 233444 -jsInitHandle 1304 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7d2b0d41-09a1-442c-834d-ca9e198749b1} 636 "\\.\pipe\gecko-crash-server-pipe.636" 4524 19149a03858 tab
                        2⤵
                          PID:1472
                        • C:\Program Files\Mozilla Firefox\firefox.exe
                          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="636.7.388922288\761781955" -childID 6 -isForBrowser -prefsHandle 5164 -prefMapHandle 5260 -prefsLen 26390 -prefMapSize 233444 -jsInitHandle 1304 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {775f1e21-29b1-4685-8446-ae4f9164b186} 636 "\\.\pipe\gecko-crash-server-pipe.636" 4600 1914ce9c958 tab
                          2⤵
                            PID:6124
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7fff9add46f8,0x7fff9add4708,0x7fff9add4718
                          1⤵
                            PID:3984
                          • C:\Windows\explorer.exe
                            explorer.exe
                            1⤵
                            • Modifies Installed Components in the registry
                            • Enumerates connected drives
                            • Checks SCSI registry key(s)
                            • Modifies registry class
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SendNotifyMessage
                            • Suspicious use of SetWindowsHookEx
                            PID:5060
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1717319785075233419,2241504794792164736,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:2
                            1⤵
                              PID:3808
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,1717319785075233419,2241504794792164736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:3
                              1⤵
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4140
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,1717319785075233419,2241504794792164736,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:8
                              1⤵
                                PID:4220
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1717319785075233419,2241504794792164736,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:1
                                1⤵
                                  PID:3996
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1717319785075233419,2241504794792164736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1
                                  1⤵
                                    PID:3364
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:1264
                                    • C:\Windows\System32\CompPkgSrv.exe
                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                      1⤵
                                        PID:4028
                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                        1⤵
                                        • Modifies Internet Explorer settings
                                        • Modifies registry class
                                        • Suspicious use of SetWindowsHookEx
                                        PID:4316
                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                        1⤵
                                        • Suspicious use of SetWindowsHookEx
                                        PID:5216
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1717319785075233419,2241504794792164736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:1
                                        1⤵
                                          PID:5288
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1717319785075233419,2241504794792164736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5716 /prefetch:1
                                          1⤵
                                            PID:5488
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1717319785075233419,2241504794792164736,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:1
                                            1⤵
                                              PID:5480
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1717319785075233419,2241504794792164736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:1
                                              1⤵
                                                PID:5472
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,1717319785075233419,2241504794792164736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3672 /prefetch:8
                                                1⤵
                                                  PID:6900
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,1717319785075233419,2241504794792164736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3672 /prefetch:8
                                                  1⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:6980
                                                • C:\Windows\explorer.exe
                                                  explorer.exe
                                                  1⤵
                                                  • Modifies Installed Components in the registry
                                                  • Enumerates connected drives
                                                  • Checks SCSI registry key(s)
                                                  • Modifies registry class
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SendNotifyMessage
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:6508
                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                  1⤵
                                                  • Modifies registry class
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:844
                                                • C:\Windows\explorer.exe
                                                  explorer.exe
                                                  1⤵
                                                  • Modifies Installed Components in the registry
                                                  • Enumerates connected drives
                                                  • Checks SCSI registry key(s)
                                                  • Modifies registry class
                                                  • Suspicious use of SendNotifyMessage
                                                  PID:5192
                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                  1⤵
                                                  • Modifies registry class
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:4648
                                                • C:\Windows\explorer.exe
                                                  explorer.exe
                                                  1⤵
                                                  • Modifies Installed Components in the registry
                                                  • Enumerates connected drives
                                                  • Checks SCSI registry key(s)
                                                  • Modifies registry class
                                                  • Suspicious use of SendNotifyMessage
                                                  PID:1584
                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                  1⤵
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:6616
                                                • C:\Windows\explorer.exe
                                                  explorer.exe
                                                  1⤵
                                                  • Modifies Installed Components in the registry
                                                  • Enumerates connected drives
                                                  • Checks SCSI registry key(s)
                                                  • Modifies registry class
                                                  PID:3680
                                                • C:\Windows\system32\werfault.exe
                                                  werfault.exe /hc /shared Global\f03a6dfc474c41e4b04cc1442c4e656f /t 4416 /p 5436
                                                  1⤵
                                                    PID:2308
                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                    1⤵
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:5772
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1717319785075233419,2241504794792164736,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5308 /prefetch:2
                                                    1⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:5148
                                                  • C:\Windows\explorer.exe
                                                    explorer.exe
                                                    1⤵
                                                    • Modifies Installed Components in the registry
                                                    • Enumerates connected drives
                                                    • Checks SCSI registry key(s)
                                                    • Modifies registry class
                                                    PID:2344
                                                  • C:\Windows\explorer.exe
                                                    explorer.exe
                                                    1⤵
                                                    • Modifies Installed Components in the registry
                                                    • Enumerates connected drives
                                                    • Checks SCSI registry key(s)
                                                    • Modifies registry class
                                                    PID:5784
                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                    1⤵
                                                    • Modifies registry class
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:6960
                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                    1⤵
                                                    • Modifies Internet Explorer settings
                                                    • Modifies registry class
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:5620
                                                  • C:\Windows\explorer.exe
                                                    explorer.exe
                                                    1⤵
                                                    • Modifies Installed Components in the registry
                                                    • Enumerates connected drives
                                                    • Checks SCSI registry key(s)
                                                    • Modifies registry class
                                                    PID:6800
                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                    1⤵
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:4536
                                                  • C:\Windows\explorer.exe
                                                    explorer.exe
                                                    1⤵
                                                    • Modifies Installed Components in the registry
                                                    • Enumerates connected drives
                                                    • Checks SCSI registry key(s)
                                                    • Modifies registry class
                                                    PID:5504
                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                    1⤵
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:656
                                                  • C:\Windows\explorer.exe
                                                    explorer.exe
                                                    1⤵
                                                    • Modifies Installed Components in the registry
                                                    • Enumerates connected drives
                                                    • Modifies registry class
                                                    PID:6804
                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                    1⤵
                                                      PID:3956
                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                      1⤵
                                                      • Modifies registry class
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:992
                                                    • C:\Windows\explorer.exe
                                                      explorer.exe
                                                      1⤵
                                                      • Modifies Installed Components in the registry
                                                      • Enumerates connected drives
                                                      • Checks SCSI registry key(s)
                                                      • Modifies registry class
                                                      PID:1804
                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                      1⤵
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:5712
                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                      1⤵
                                                      • Modifies Internet Explorer settings
                                                      • Modifies registry class
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:4536
                                                    • C:\Windows\explorer.exe
                                                      explorer.exe
                                                      1⤵
                                                      • Modifies Installed Components in the registry
                                                      • Enumerates connected drives
                                                      • Checks SCSI registry key(s)
                                                      • Modifies registry class
                                                      PID:7156
                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                      1⤵
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:6664
                                                    • C:\Windows\explorer.exe
                                                      explorer.exe
                                                      1⤵
                                                      • Modifies Installed Components in the registry
                                                      • Enumerates connected drives
                                                      • Checks SCSI registry key(s)
                                                      • Modifies registry class
                                                      PID:5304
                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                      1⤵
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:6684
                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                      1⤵
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2952
                                                    • C:\Windows\explorer.exe
                                                      explorer.exe
                                                      1⤵
                                                      • Modifies Installed Components in the registry
                                                      • Enumerates connected drives
                                                      • Checks SCSI registry key(s)
                                                      • Modifies registry class
                                                      PID:5448
                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                      1⤵
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:5352
                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                      1⤵
                                                      • Modifies Internet Explorer settings
                                                      • Modifies registry class
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:3956
                                                    • C:\Windows\explorer.exe
                                                      explorer.exe
                                                      1⤵
                                                      • Modifies Installed Components in the registry
                                                      • Enumerates connected drives
                                                      • Modifies registry class
                                                      PID:1240
                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                      1⤵
                                                        PID:4708
                                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                        1⤵
                                                          PID:5260
                                                        • C:\Windows\explorer.exe
                                                          explorer.exe
                                                          1⤵
                                                            PID:368
                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                            1⤵
                                                              PID:5424
                                                            • C:\Windows\explorer.exe
                                                              explorer.exe
                                                              1⤵
                                                                PID:6648
                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                1⤵
                                                                  PID:656
                                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                  1⤵
                                                                    PID:6848
                                                                  • C:\Windows\explorer.exe
                                                                    explorer.exe
                                                                    1⤵
                                                                      PID:5244
                                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                      1⤵
                                                                        PID:6464
                                                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                        1⤵
                                                                          PID:3276
                                                                        • C:\Windows\explorer.exe
                                                                          explorer.exe
                                                                          1⤵
                                                                            PID:5660
                                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                            1⤵
                                                                              PID:4548
                                                                            • C:\Windows\explorer.exe
                                                                              explorer.exe
                                                                              1⤵
                                                                                PID:5260
                                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                1⤵
                                                                                  PID:6728
                                                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                  1⤵
                                                                                    PID:3420
                                                                                  • C:\Windows\explorer.exe
                                                                                    explorer.exe
                                                                                    1⤵
                                                                                      PID:1528
                                                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                      1⤵
                                                                                        PID:3220
                                                                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                        1⤵
                                                                                          PID:224
                                                                                        • C:\Windows\explorer.exe
                                                                                          explorer.exe
                                                                                          1⤵
                                                                                            PID:5400
                                                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                            1⤵
                                                                                              PID:4832
                                                                                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                              1⤵
                                                                                                PID:5432
                                                                                              • C:\Windows\explorer.exe
                                                                                                explorer.exe
                                                                                                1⤵
                                                                                                  PID:6264
                                                                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                                  1⤵
                                                                                                    PID:4708
                                                                                                  • C:\Windows\explorer.exe
                                                                                                    explorer.exe
                                                                                                    1⤵
                                                                                                      PID:5688
                                                                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                                      1⤵
                                                                                                        PID:6980

                                                                                                      Network

                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                      Replay Monitor

                                                                                                      Loading Replay Monitor...

                                                                                                      Downloads

                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                        Filesize

                                                                                                        180B

                                                                                                        MD5

                                                                                                        00a455d9d155394bfb4b52258c97c5e5

                                                                                                        SHA1

                                                                                                        2761d0c955353e1982a588a3df78f2744cfaa9df

                                                                                                        SHA256

                                                                                                        45a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed

                                                                                                        SHA512

                                                                                                        9553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f

                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                                                                                        Filesize

                                                                                                        111B

                                                                                                        MD5

                                                                                                        285252a2f6327d41eab203dc2f402c67

                                                                                                        SHA1

                                                                                                        acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                                                                        SHA256

                                                                                                        5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                                                                        SHA512

                                                                                                        11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                                                                      • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\stdidscq.default-release\cache2\entries\B573808F9B4F64D3E5F0B069BDAA48EF4086E712

                                                                                                        Filesize

                                                                                                        13KB

                                                                                                        MD5

                                                                                                        3214edcac36f4fa9a0576eecf678da08

                                                                                                        SHA1

                                                                                                        e7e9439256dcb04ba8d3afe6d0057d9e9710cd75

                                                                                                        SHA256

                                                                                                        112996ab658ddcdd612cc039140ccc263d41be08effc6ac4604b082b570b8766

                                                                                                        SHA512

                                                                                                        e61842d810a1687f064db5246aecc49cff18f912abeba1310a18791b22c22b6495e770e746a3583b0d53fd226a30d738393b0b1154a97196e774c307ec107405

                                                                                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\2R2B26TQ\microsoft.windows[1].xml

                                                                                                        Filesize

                                                                                                        97B

                                                                                                        MD5

                                                                                                        d65f38501205b3ea95f21036eca92302

                                                                                                        SHA1

                                                                                                        f9e3f6582b0e03a5e188ba8eeea7684467702531

                                                                                                        SHA256

                                                                                                        397cb2cd08fce98305fd1474bf99cae9110cb7ea9f3c5594ff2e499669e85d39

                                                                                                        SHA512

                                                                                                        dc32eefbd5839fe2a03e96ac5df307784c1babe804ba8f0d137a4b934d92549572b978a936b3e55affcdf829819456e0dd96b54c42c75bf281ba54c10573e845

                                                                                                      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133481965101699369.txt

                                                                                                        Filesize

                                                                                                        74KB

                                                                                                        MD5

                                                                                                        c09e63e4b960a163934b3c29f3bd2cc9

                                                                                                        SHA1

                                                                                                        d3a43b35c14ae2e353a1a15c518ab2595f6a0399

                                                                                                        SHA256

                                                                                                        308deca5e1ef4d875fbe0aff3ce4b0b575b28e643dffda819d4390ec77faf157

                                                                                                        SHA512

                                                                                                        5ca3321034dff47e3afe0b0bdfaffc08782991660910a29375a8e0363794b78247282aba65dbd882ae225aa140ae63927dfd0946a441ee6fa64a1d8c146777b9

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\VCRUNTIME140.dll

                                                                                                        Filesize

                                                                                                        106KB

                                                                                                        MD5

                                                                                                        870fea4e961e2fbd00110d3783e529be

                                                                                                        SHA1

                                                                                                        a948e65c6f73d7da4ffde4e8533c098a00cc7311

                                                                                                        SHA256

                                                                                                        76fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644

                                                                                                        SHA512

                                                                                                        0b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\VCRUNTIME140_1.dll

                                                                                                        Filesize

                                                                                                        48KB

                                                                                                        MD5

                                                                                                        bba9680bc310d8d25e97b12463196c92

                                                                                                        SHA1

                                                                                                        9a480c0cf9d377a4caedd4ea60e90fa79001f03a

                                                                                                        SHA256

                                                                                                        e0b66601cc28ecb171c3d4b7ac690c667f47da6b6183bff80604c84c00d265ab

                                                                                                        SHA512

                                                                                                        1575c786ac3324b17057255488da5f0bc13ad943ac9383656baf98db64d4ec6e453230de4cd26b535ce7e8b7d41a9f2d3f569a0eff5a84aeb1c2f9d6e3429739

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\_asyncio.pyd

                                                                                                        Filesize

                                                                                                        62KB

                                                                                                        MD5

                                                                                                        4543813a21958d0764975032b09ded7b

                                                                                                        SHA1

                                                                                                        c571dea89ab89b6aab6da9b88afe78ace90dd882

                                                                                                        SHA256

                                                                                                        45c229c3988f30580c79b38fc0c19c81e6f7d5778e64cef6ce04dd188a9ccab5

                                                                                                        SHA512

                                                                                                        3b007ab252cccda210b473ca6e2d4b7fe92c211fb81ade41a5a69c67adde703a9b0bc97990f31dcbe049794c62ba2b70dadf699e83764893a979e95fd6e89d8f

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\_bz2.pyd

                                                                                                        Filesize

                                                                                                        81KB

                                                                                                        MD5

                                                                                                        bbe89cf70b64f38c67b7bf23c0ea8a48

                                                                                                        SHA1

                                                                                                        44577016e9c7b463a79b966b67c3ecc868957470

                                                                                                        SHA256

                                                                                                        775fbc6e9a4c7e9710205157350f3d6141b5a9e8f44cb07b3eac38f2789c8723

                                                                                                        SHA512

                                                                                                        3ee72ba60541116bbca1a62db64074276d40ad8ed7d0ca199a9c51d65c3f0762a8ef6d0e1e9ebf04bf4efe1347f120e4bc3d502dd288339b4df646a59aad0ec1

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\_cffi_backend.cp310-win_amd64.pyd

                                                                                                        Filesize

                                                                                                        177KB

                                                                                                        MD5

                                                                                                        ebb660902937073ec9695ce08900b13d

                                                                                                        SHA1

                                                                                                        881537acead160e63fe6ba8f2316a2fbbb5cb311

                                                                                                        SHA256

                                                                                                        52e5a0c3ca9b0d4fc67243bd8492f5c305ff1653e8d956a2a3d9d36af0a3e4fd

                                                                                                        SHA512

                                                                                                        19d5000ef6e473d2f533603afe8d50891f81422c59ae03bead580412ec756723dc3379310e20cd0c39e9683ce7c5204791012e1b6b73996ea5cb59e8d371de24

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\_ctypes.pyd

                                                                                                        Filesize

                                                                                                        119KB

                                                                                                        MD5

                                                                                                        ca4cef051737b0e4e56b7d597238df94

                                                                                                        SHA1

                                                                                                        583df3f7ecade0252fdff608eb969439956f5c4a

                                                                                                        SHA256

                                                                                                        e60a2b100c4fa50b0b144cf825fe3cde21a8b7b60b92bfc326cb39573ce96b2b

                                                                                                        SHA512

                                                                                                        17103d6b5fa84156055e60f9e5756ffc31584cdb6274c686a136291c58ba0be00238d501f8acc1f1ca7e1a1fadcb0c7fefddcb98cedb9dd04325314f7e905df3

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\_decimal.pyd

                                                                                                        Filesize

                                                                                                        242KB

                                                                                                        MD5

                                                                                                        6339fa92584252c3b24e4cce9d73ef50

                                                                                                        SHA1

                                                                                                        dccda9b641125b16e56c5b1530f3d04e302325cd

                                                                                                        SHA256

                                                                                                        4ae6f6fb3992bb878416211221b3d62515e994d78f72eab51e0126ca26d0ee96

                                                                                                        SHA512

                                                                                                        428b62591d4eba3a4e12f7088c990c48e30b6423019bebf8ede3636f6708e1f4151f46d442516d2f96453694ebeef78618c0c8a72e234f679c6e4d52bebc1b84

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\_hashlib.pyd

                                                                                                        Filesize

                                                                                                        60KB

                                                                                                        MD5

                                                                                                        d856a545a960bf2dca1e2d9be32e5369

                                                                                                        SHA1

                                                                                                        67a15ecf763cdc2c2aa458a521db8a48d816d91e

                                                                                                        SHA256

                                                                                                        cd33f823e608d3bda759ad441f583a20fc0198119b5a62a8964f172559acb7d3

                                                                                                        SHA512

                                                                                                        34a074025c8b28f54c01a7fd44700fdedb391f55be39d578a003edb90732dec793c2b0d16da3da5cdbd8adbaa7b3b83fc8887872e284800e7a8389345a30a6a4

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\_lzma.pyd

                                                                                                        Filesize

                                                                                                        153KB

                                                                                                        MD5

                                                                                                        0a94c9f3d7728cf96326db3ab3646d40

                                                                                                        SHA1

                                                                                                        8081df1dca4a8520604e134672c4be79eb202d14

                                                                                                        SHA256

                                                                                                        0a70e8546fa6038029f2a3764e721ceebea415818e5f0df6b90d6a40788c3b31

                                                                                                        SHA512

                                                                                                        6f047f3bdaead121018623f52a35f7e8b38c58d3a9cb672e8056a5274d02395188975de08cabae948e2cc2c1ca01c74ca7bc1b82e2c23d652e952f3745491087

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\_multiprocessing.pyd

                                                                                                        Filesize

                                                                                                        32KB

                                                                                                        MD5

                                                                                                        62733ce8ae95241bf9ca69f38c977923

                                                                                                        SHA1

                                                                                                        e5c3f4809e85b331cc8c5ba0ae76979f2dfddf85

                                                                                                        SHA256

                                                                                                        af84076b03a0eadec2b75d01f06bb3765b35d6f0639fb7c14378736d64e1acaa

                                                                                                        SHA512

                                                                                                        fdfbf5d74374f25ed5269cdbcdf8e643b31faa9c8205eac4c22671aa5debdce4052f1878f38e7fab43b85a44cb5665e750edce786caba172a2861a5eabfd8d49

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\_overlapped.pyd

                                                                                                        Filesize

                                                                                                        47KB

                                                                                                        MD5

                                                                                                        02c0f2eff280b9a92003786fded7c440

                                                                                                        SHA1

                                                                                                        5a7fe7ed605ff1c49036d001ae60305e309c5509

                                                                                                        SHA256

                                                                                                        f16e595b0a87c32d9abd2035f8ea97b39339548e7c518df16a6cc27ba7733973

                                                                                                        SHA512

                                                                                                        2b05ddf7bc57e8472e5795e68660d52e843271fd08f2e8002376b056a8c20200d31ffd5e194ce486f8a0928a8486951fdb5670246f1c909f82cf4b0929efedac

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\_queue.pyd

                                                                                                        Filesize

                                                                                                        29KB

                                                                                                        MD5

                                                                                                        52d0a6009d3de40f4fa6ec61db98c45c

                                                                                                        SHA1

                                                                                                        5083a2aff5bcce07c80409646347c63d2a87bd25

                                                                                                        SHA256

                                                                                                        007bcf19d9b036a7e73f5ef31f39bfb1910f72c9c10e4a1b0658352cfe7a8b75

                                                                                                        SHA512

                                                                                                        cd552a38efaa8720a342b60318f62320ce20c03871d2e50d3fa3a9a730b84dacdbb8eb4d0ab7a1c8a97215b537826c8dc532c9a55213bcd0c1d13d7d8a9ad824

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\_socket.pyd

                                                                                                        Filesize

                                                                                                        75KB

                                                                                                        MD5

                                                                                                        0f5e64e33f4d328ef11357635707d154

                                                                                                        SHA1

                                                                                                        8b6dcb4b9952b362f739a3f16ae96c44bea94a0e

                                                                                                        SHA256

                                                                                                        8af6d70d44bb9398733f88bcfb6d2085dd1a193cd00e52120b96a651f6e35ebe

                                                                                                        SHA512

                                                                                                        4be9febb583364da75b6fb3a43a8b50ee29ca8fc1dda35b96c0fcc493342372f69b4f27f2604888bca099c8d00f38a16f4c9463c16eff098227d812c29563643

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\_sqlite3.pyd

                                                                                                        Filesize

                                                                                                        95KB

                                                                                                        MD5

                                                                                                        9f38f603bd8f7559609c4ffa47f23c86

                                                                                                        SHA1

                                                                                                        8b0136fc2506c1ccef2009db663e4e7006e23c92

                                                                                                        SHA256

                                                                                                        28090432a18b59eb8cbe8fdcf11a277420b404007f31ca571321488a43b96319

                                                                                                        SHA512

                                                                                                        273a19f2f609bede9634dae7c47d7b28d369c88420b2b62d42858b1268d6c19b450d83877d2dba241e52755a3f67a87f63fea8e5754831c86d16e2a8f214ad72

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\_ssl.pyd

                                                                                                        Filesize

                                                                                                        155KB

                                                                                                        MD5

                                                                                                        9ddb64354ef0b91c6999a4b244a0a011

                                                                                                        SHA1

                                                                                                        86a9dc5ea931638699eb6d8d03355ad7992d2fee

                                                                                                        SHA256

                                                                                                        e33b7a4aa5cdd5462ee66830636fdd38048575a43d06eb7e2f688358525ddeab

                                                                                                        SHA512

                                                                                                        4c86478861fa4220680a94699e7d55fbdc90d2785caee10619cecb058f833292ee7c3d6ac2ed1ef34b38fbff628b79d672194a337701727a54bb6bbc5bf9aeca

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\_uuid.pyd

                                                                                                        Filesize

                                                                                                        23KB

                                                                                                        MD5

                                                                                                        041556420bdb334a71765d33229e9945

                                                                                                        SHA1

                                                                                                        0122316e74ee4ada1ce1e0310b8dca1131972ce1

                                                                                                        SHA256

                                                                                                        8b3d4767057c18c1c496e138d4843f25e5c98ddfc6a8d1b0ed46fd938ede5bb6

                                                                                                        SHA512

                                                                                                        18da574b362726ede927d4231cc7f2aebafbaaab47df1e31b233f7eda798253aef4c142bed1a80164464bd629015d387ae97ba36fcd3cedcfe54a5a1e5c5caa3

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\base_library.zip

                                                                                                        Filesize

                                                                                                        859KB

                                                                                                        MD5

                                                                                                        6d649e03da81ff46a818ab6ee74e27e2

                                                                                                        SHA1

                                                                                                        90abc7195d2d98bac836dcc05daab68747770a49

                                                                                                        SHA256

                                                                                                        afede0c40e05ce5a50ff541b074d878b07753b7c1b21d15f69d17f66101ba8fd

                                                                                                        SHA512

                                                                                                        e39621c9a63c9c72616ae1f960e928ad4e7bad57bfb5172b296a7cc49e8b8e873be44247a475e7e1ded6bc7e17aa351397cdeb40841258e75193586f4649d737

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\charset_normalizer\md.cp310-win_amd64.pyd

                                                                                                        Filesize

                                                                                                        10KB

                                                                                                        MD5

                                                                                                        f33ca57d413e6b5313272fa54dbc8baa

                                                                                                        SHA1

                                                                                                        4e0cabe7d38fe8d649a0a497ed18d4d1ca5f4c44

                                                                                                        SHA256

                                                                                                        9b3d70922dcfaeb02812afa9030a40433b9d2b58bcf088781f9ab68a74d20664

                                                                                                        SHA512

                                                                                                        f17c06f4202b6edbb66660d68ff938d4f75b411f9fab48636c3575e42abaab6464d66cb57bce7f84e8e2b5755b6ef757a820a50c13dd5f85faa63cd553d3ff32

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\libcrypto-1_1.dll

                                                                                                        Filesize

                                                                                                        3.3MB

                                                                                                        MD5

                                                                                                        6f4b8eb45a965372156086201207c81f

                                                                                                        SHA1

                                                                                                        8278f9539463f0a45009287f0516098cb7a15406

                                                                                                        SHA256

                                                                                                        976ce72efd0a8aeeb6e21ad441aa9138434314ea07f777432205947cdb149541

                                                                                                        SHA512

                                                                                                        2c5c54842aba9c82fb9e7594ae9e264ac3cbdc2cc1cd22263e9d77479b93636799d0f28235ac79937070e40b04a097c3ea3b7e0cd4376a95ed8ca90245b7891f

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\libffi-7.dll

                                                                                                        Filesize

                                                                                                        32KB

                                                                                                        MD5

                                                                                                        eef7981412be8ea459064d3090f4b3aa

                                                                                                        SHA1

                                                                                                        c60da4830ce27afc234b3c3014c583f7f0a5a925

                                                                                                        SHA256

                                                                                                        f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

                                                                                                        SHA512

                                                                                                        dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\libssl-1_1.dll

                                                                                                        Filesize

                                                                                                        686KB

                                                                                                        MD5

                                                                                                        8769adafca3a6fc6ef26f01fd31afa84

                                                                                                        SHA1

                                                                                                        38baef74bdd2e941ccd321f91bfd49dacc6a3cb6

                                                                                                        SHA256

                                                                                                        2aebb73530d21a2273692a5a3d57235b770daf1c35f60c74e01754a5dac05071

                                                                                                        SHA512

                                                                                                        fac22f1a2ffbfb4789bdeed476c8daf42547d40efe3e11b41fadbc4445bb7ca77675a31b5337df55fdeb4d2739e0fb2cbcac2feabfd4cd48201f8ae50a9bd90b

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\pyexpat.pyd

                                                                                                        Filesize

                                                                                                        193KB

                                                                                                        MD5

                                                                                                        43e5a1470c298ba773ac9fcf5d99e8f9

                                                                                                        SHA1

                                                                                                        06db03daf3194c9e492b2f406b38ed33a8c87ab3

                                                                                                        SHA256

                                                                                                        56984d43be27422d31d8ece87d0abda2c0662ea2ff22af755e49e3462a5f8b65

                                                                                                        SHA512

                                                                                                        a5a1ebb34091ea17c8f0e7748004558d13807fdc16529bc6f8f6c6a3a586ee997bf72333590dc451d78d9812ef8adfa7deabab6c614fce537f56fa38ce669cfc

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\python3.dll

                                                                                                        Filesize

                                                                                                        63KB

                                                                                                        MD5

                                                                                                        c17b7a4b853827f538576f4c3521c653

                                                                                                        SHA1

                                                                                                        6115047d02fbbad4ff32afb4ebd439f5d529485a

                                                                                                        SHA256

                                                                                                        d21e60f3dfbf2bab0cc8a06656721fa3347f026df10297674fc635ebf9559a68

                                                                                                        SHA512

                                                                                                        8e08e702d69df6840781d174c4565e14a28022b40f650fda88d60172be2d4ffd96a3e9426d20718c54072ca0da27e0455cc0394c098b75e062a27559234a3df7

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\python310.dll

                                                                                                        Filesize

                                                                                                        4.3MB

                                                                                                        MD5

                                                                                                        deaf0c0cc3369363b800d2e8e756a402

                                                                                                        SHA1

                                                                                                        3085778735dd8badad4e39df688139f4eed5f954

                                                                                                        SHA256

                                                                                                        156cf2b64dd0f4d9bdb346b654a11300d6e9e15a65ef69089923dafc1c71e33d

                                                                                                        SHA512

                                                                                                        5cac1d92af7ee18425b5ee8e7cd4e941a9ddffb4bc1c12bb8aeabeed09acec1ff0309abc41a2e0c8db101fee40724f8bfb27a78898128f8746c8fe01c1631989

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\pywin32_system32\pythoncom310.dll

                                                                                                        Filesize

                                                                                                        653KB

                                                                                                        MD5

                                                                                                        65dd753f51cd492211986e7b700983ef

                                                                                                        SHA1

                                                                                                        f5b469ec29a4be76bc479b2219202f7d25a261e2

                                                                                                        SHA256

                                                                                                        c3b33ba6c4f646151aed4172562309d9f44a83858ddfd84b2d894a8b7da72b1e

                                                                                                        SHA512

                                                                                                        8bd505e504110e40fa4973feff2fae17edc310a1ce1dc78b6af7972efdd93348087e6f16296bfd57abfdbbe49af769178f063bb0aa1dee661c08659f47a6216d

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\pywin32_system32\pywintypes310.dll

                                                                                                        Filesize

                                                                                                        131KB

                                                                                                        MD5

                                                                                                        ceb06a956b276cea73098d145fa64712

                                                                                                        SHA1

                                                                                                        6f0ba21f0325acc7cf6bf9f099d9a86470a786bf

                                                                                                        SHA256

                                                                                                        c8ec6429d243aef1f78969863be23d59273fa6303760a173ab36ab71d5676005

                                                                                                        SHA512

                                                                                                        05bab4a293e4c7efa85fa2491c32f299afd46fdb079dcb7ee2cc4c31024e01286daaf4aead5082fc1fd0d4169b2d1be589d1670fcf875b06c6f15f634e0c6f34

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\select.pyd

                                                                                                        Filesize

                                                                                                        28KB

                                                                                                        MD5

                                                                                                        c119811a40667dca93dfe6faa418f47a

                                                                                                        SHA1

                                                                                                        113e792b7dcec4366fc273e80b1fc404c309074c

                                                                                                        SHA256

                                                                                                        8f27cd8c5071cb740a2191b3c599e99595b121f461988166f07d9f841e7116b7

                                                                                                        SHA512

                                                                                                        107257dbd8cf2607e4a1c7bef928a6f61ebdfc21be1c4bdc3a649567e067e9bb7ea40c0ac8844d2cedd08682447b963148b52f85adb1837f243df57af94c04b3

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\sqlite3.dll

                                                                                                        Filesize

                                                                                                        1.4MB

                                                                                                        MD5

                                                                                                        aaf9fd98bc2161ad7dff996450173a3b

                                                                                                        SHA1

                                                                                                        ab634c09b60aa18ea165084a042d917b65d1fe85

                                                                                                        SHA256

                                                                                                        f1e8b6c4d61ac6a320fa2566da9391fbfd65a5ac34ac2e2013bc37c8b7b41592

                                                                                                        SHA512

                                                                                                        597ffe3c2f0966ab94fbb7ecac27160c691f4a07332311f6a9baf8dec8b16fb16ec64df734c3bdbabf2c0328699e234d14f1b8bd5ac951782d35ea0c78899e5f

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\unicodedata.pyd

                                                                                                        Filesize

                                                                                                        1.1MB

                                                                                                        MD5

                                                                                                        4c8af8a30813e9380f5f54309325d6b8

                                                                                                        SHA1

                                                                                                        169a80d8923fb28f89bc26ebf89ffe37f8545c88

                                                                                                        SHA256

                                                                                                        4b6e3ba734c15ec789b5d7469a5097bd082bdfd8e55e636ded0d097cf6511e05

                                                                                                        SHA512

                                                                                                        ea127779901b10953a2bf9233e20a4fab2fba6f97d7baf40c1b314b7cd03549e0f4d2fb9bad0fbc23736e21eb391a418d79a51d64402245c1cd8899e4d765c5a

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI46282\win32\win32api.pyd

                                                                                                        Filesize

                                                                                                        130KB

                                                                                                        MD5

                                                                                                        00e5da545c6a4979a6577f8f091e85e1

                                                                                                        SHA1

                                                                                                        a31a2c85e272234584dacf36f405d102d9c43c05

                                                                                                        SHA256

                                                                                                        ac483d60a565cc9cbf91a6f37ea516b2162a45d255888d50fbbb7e5ff12086ee

                                                                                                        SHA512

                                                                                                        9e4f834f56007f84e8b4ec1c16fb916e68c3baadab1a3f6b82faf5360c57697dc69be86f3c2ea6e30f95e7c32413babbe5d29422d559c99e6cf4242357a85f31

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\crcook.txt

                                                                                                        Filesize

                                                                                                        29B

                                                                                                        MD5

                                                                                                        155ea3c94a04ceab8bd7480f9205257d

                                                                                                        SHA1

                                                                                                        b46bbbb64b3df5322dd81613e7fa14426816b1c1

                                                                                                        SHA256

                                                                                                        445e2bcecaa0d8d427b87e17e7e53581d172af1b9674cf1a33dbe1014732108b

                                                                                                        SHA512

                                                                                                        3d47449da7c91fe279217a946d2f86e5d95d396f53b55607ec8aca7e9aa545cfaf9cb97914b643a5d8a91944570f9237e18eecec0f1526735be6ceee45ecba05

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                                        Filesize

                                                                                                        442KB

                                                                                                        MD5

                                                                                                        85430baed3398695717b0263807cf97c

                                                                                                        SHA1

                                                                                                        fffbee923cea216f50fce5d54219a188a5100f41

                                                                                                        SHA256

                                                                                                        a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e

                                                                                                        SHA512

                                                                                                        06511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\tmpaddon-1

                                                                                                        Filesize

                                                                                                        8.0MB

                                                                                                        MD5

                                                                                                        a01c5ecd6108350ae23d2cddf0e77c17

                                                                                                        SHA1

                                                                                                        c6ac28a2cd979f1f9a75d56271821d5ff665e2b6

                                                                                                        SHA256

                                                                                                        345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42

                                                                                                        SHA512

                                                                                                        b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72

                                                                                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-ms

                                                                                                        Filesize

                                                                                                        5KB

                                                                                                        MD5

                                                                                                        a1134f38a594a94d7a138cafe1c5ea25

                                                                                                        SHA1

                                                                                                        55c15a75c77da41ecae1d40be8a2d72b5528c36e

                                                                                                        SHA256

                                                                                                        800d050f523ae1ce7519480769c855b388c0bef0481fcd747804cecba0d13c3e

                                                                                                        SHA512

                                                                                                        5eaabe0307ae6b75fe1e0fa7b88b676b0feb43bae937620043e762e766f6911a853d2e13a5b8364330bcde9b21956a5bac6db6c7c8426a7fe362fb14331ecfef

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\stdidscq.default-release\bookmarkbackups\bookmarks-2023-12-28_11_eAxAL8SpFfZxWj+8QWgDyg==.jsonlz4

                                                                                                        Filesize

                                                                                                        950B

                                                                                                        MD5

                                                                                                        6c53fd868850f42922d96824d8a5d8b9

                                                                                                        SHA1

                                                                                                        2f1a931c418593cc66c10c53d2a9fd52a76ad106

                                                                                                        SHA256

                                                                                                        4b24e064ccf3cae7a9fa10520afd392c7782d2ac2480825529e9c9d77b60d470

                                                                                                        SHA512

                                                                                                        65e938acd9cb2e7cb7d23be342a128154b3adf4fa56635c021ab3df4a9e65a5604c5e9dd645d950e060291ce69dc3bf5fa019c5aa77133a26a4e87cea73be3b6

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\stdidscq.default-release\broadcast-listeners.json

                                                                                                        Filesize

                                                                                                        216B

                                                                                                        MD5

                                                                                                        b94516e746c7244ef07684dffa701229

                                                                                                        SHA1

                                                                                                        e230e81a31ca6a23d380e290376035c231ee7eae

                                                                                                        SHA256

                                                                                                        f62fb6fb66094622ccb1f9580efc0c8e0f52f07ff2200d4cef98a08627b96391

                                                                                                        SHA512

                                                                                                        1198e1ce66af801783232b111478ac765940caff35739f74ba59fcbc9f3aca763784ffe8ff63c4e531e21600de539cc138272c98b51237d23c4d901550967e48

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\stdidscq.default-release\datareporting\glean\db\data.safe.bin

                                                                                                        Filesize

                                                                                                        9KB

                                                                                                        MD5

                                                                                                        ffb0bb48db5d2e6244d588d185cc627d

                                                                                                        SHA1

                                                                                                        e251ae2747322b6d9c22ffb7f7e0b03bda9b2262

                                                                                                        SHA256

                                                                                                        373f866f4e544927a3c5880dbd3eceb2b357d90dacf7ce0114a86d2ff3aebb62

                                                                                                        SHA512

                                                                                                        2d9c133c2bc840d46d6f96f80cbcc3eff6ba2d1831209aaf779d70bc9a8358e3116f785fe58d9c2233b2d1b22e9b06402c46312ca3e93353921ca2029be0a5a0

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\stdidscq.default-release\datareporting\glean\pending_pings\583351c7-4e43-41bb-bbad-f85af9b2df64

                                                                                                        Filesize

                                                                                                        734B

                                                                                                        MD5

                                                                                                        797e02bf4d73f9fc12ffe5b0e31eb0da

                                                                                                        SHA1

                                                                                                        a8230af05d67ac473619075664bd6b80b4f6d616

                                                                                                        SHA256

                                                                                                        c75dec8ba93fe4ba0c66b7fce7a7c3f99fb5d444b128cc27313b127d8bafabe2

                                                                                                        SHA512

                                                                                                        23048d82952cfdf4a4605f7b38764e0c757ffd6c51742a72486fdca8e95e2c87b125e60201d239308dfad8685500e5f4257f8841624e05b8e4432dfb649e7980

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\stdidscq.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll

                                                                                                        Filesize

                                                                                                        997KB

                                                                                                        MD5

                                                                                                        fe3355639648c417e8307c6d051e3e37

                                                                                                        SHA1

                                                                                                        f54602d4b4778da21bc97c7238fc66aa68c8ee34

                                                                                                        SHA256

                                                                                                        1ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e

                                                                                                        SHA512

                                                                                                        8f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\stdidscq.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info

                                                                                                        Filesize

                                                                                                        116B

                                                                                                        MD5

                                                                                                        3d33cdc0b3d281e67dd52e14435dd04f

                                                                                                        SHA1

                                                                                                        4db88689282fd4f9e9e6ab95fcbb23df6e6485db

                                                                                                        SHA256

                                                                                                        f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b

                                                                                                        SHA512

                                                                                                        a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\stdidscq.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt

                                                                                                        Filesize

                                                                                                        479B

                                                                                                        MD5

                                                                                                        49ddb419d96dceb9069018535fb2e2fc

                                                                                                        SHA1

                                                                                                        62aa6fea895a8b68d468a015f6e6ab400d7a7ca6

                                                                                                        SHA256

                                                                                                        2af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539

                                                                                                        SHA512

                                                                                                        48386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\stdidscq.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json

                                                                                                        Filesize

                                                                                                        372B

                                                                                                        MD5

                                                                                                        8be33af717bb1b67fbd61c3f4b807e9e

                                                                                                        SHA1

                                                                                                        7cf17656d174d951957ff36810e874a134dd49e0

                                                                                                        SHA256

                                                                                                        e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd

                                                                                                        SHA512

                                                                                                        6125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\stdidscq.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll

                                                                                                        Filesize

                                                                                                        11.8MB

                                                                                                        MD5

                                                                                                        33bf7b0439480effb9fb212efce87b13

                                                                                                        SHA1

                                                                                                        cee50f2745edc6dc291887b6075ca64d716f495a

                                                                                                        SHA256

                                                                                                        8ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e

                                                                                                        SHA512

                                                                                                        d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\stdidscq.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib

                                                                                                        Filesize

                                                                                                        1KB

                                                                                                        MD5

                                                                                                        688bed3676d2104e7f17ae1cd2c59404

                                                                                                        SHA1

                                                                                                        952b2cdf783ac72fcb98338723e9afd38d47ad8e

                                                                                                        SHA256

                                                                                                        33899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237

                                                                                                        SHA512

                                                                                                        7a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\stdidscq.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig

                                                                                                        Filesize

                                                                                                        1KB

                                                                                                        MD5

                                                                                                        937326fead5fd401f6cca9118bd9ade9

                                                                                                        SHA1

                                                                                                        4526a57d4ae14ed29b37632c72aef3c408189d91

                                                                                                        SHA256

                                                                                                        68a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81

                                                                                                        SHA512

                                                                                                        b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\stdidscq.default-release\prefs-1.js

                                                                                                        Filesize

                                                                                                        7KB

                                                                                                        MD5

                                                                                                        6923f26de49fe703f4afd4736485ecc2

                                                                                                        SHA1

                                                                                                        2ca1aa30a6b4102ad925c26b34f5c050d03a0087

                                                                                                        SHA256

                                                                                                        bea83cb3d5f0ccb6985c1d1f9cbce2753c3e025ab08ffa9ed09fa1387d87e4c0

                                                                                                        SHA512

                                                                                                        132ecc0f5307d6f319055b8205cb3f91d787dd340fbdcb4dda5ea19e7ebaf4324560e615aacd43e9ecab6406da7caeaf035f295b22ec1ccdfecba4e0d6490d8c

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\stdidscq.default-release\prefs-1.js

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        7f4cb535ad18758c0446784a18f046b0

                                                                                                        SHA1

                                                                                                        90f879dad20d93d5ad63430b0ce4b623530cd432

                                                                                                        SHA256

                                                                                                        131932681378ae0cac3a902cce835075df0784d57264aa885188b69b156b31ba

                                                                                                        SHA512

                                                                                                        30d21c20203f70bb31d4732124b326e664fb633b3bb3bc9674838d20802b58a21a641c4408a7d828a2e5370e50855115fbb56c51750e97f73fce0b7677227f9e

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\stdidscq.default-release\prefs-1.js

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        8241a63131f084a699319d056e293b46

                                                                                                        SHA1

                                                                                                        1948e4186c69131467fb9ba01cc363d753629ee1

                                                                                                        SHA256

                                                                                                        d42b94e405cea1123e2649df7c27af582d2082189211d7c2f1c6c66cb7e89ee4

                                                                                                        SHA512

                                                                                                        f9a2a4d588ca286a68796400f2e187afa1a6191f875c08c01ea6620ac10a68c271cf37a86f56853def9862ecd3b8e1ace0bde4d94ef96796a56b2c2689f378ec

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\stdidscq.default-release\prefs-1.js

                                                                                                        Filesize

                                                                                                        9KB

                                                                                                        MD5

                                                                                                        5dbb97dfb78081e5b042a54338eeb4b7

                                                                                                        SHA1

                                                                                                        b8daafacbbc64b0794d5d8ac77a7b3ae29830ae2

                                                                                                        SHA256

                                                                                                        fefc064846e7dac2b0850f3ae17957b1ed09fa7591a870953c85675dfb4afbdf

                                                                                                        SHA512

                                                                                                        bc6b950a4e8ead89eacdbe3b4610c0aa01ab2da03cda496d69e917ac4963941480420311bb746b6cdff722d869902a002df18e3d3d664dde4735a6461d54e6f2

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\stdidscq.default-release\sessionCheckpoints.json

                                                                                                        Filesize

                                                                                                        90B

                                                                                                        MD5

                                                                                                        c4ab2ee59ca41b6d6a6ea911f35bdc00

                                                                                                        SHA1

                                                                                                        5942cd6505fc8a9daba403b082067e1cdefdfbc4

                                                                                                        SHA256

                                                                                                        00ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2

                                                                                                        SHA512

                                                                                                        71ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\stdidscq.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                        Filesize

                                                                                                        1KB

                                                                                                        MD5

                                                                                                        1f8a45bcf378bc541fa33d5a48e12827

                                                                                                        SHA1

                                                                                                        250a23dfc69e8cd8ce6102a9992ce349a0e053f9

                                                                                                        SHA256

                                                                                                        c0d54e36971d4caee9327867eee50483215313416a1764470f1d6cb22bbc9f0e

                                                                                                        SHA512

                                                                                                        601273c7f338edbdc74e1927ef64bb2447ca744ee7016ff928dee057fd1158385e9bd3f60ee9750a9734559278b0b6cb6d16ada88b18650ecb6f4ae9cc01d4a3

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\stdidscq.default-release\sessionstore-backups\recovery.jsonlz4

                                                                                                        Filesize

                                                                                                        1KB

                                                                                                        MD5

                                                                                                        b6122ddf8c33f468ef15baae3d70ac18

                                                                                                        SHA1

                                                                                                        eb6297b73ba2da666e4845b1fd7a87dd63a85f13

                                                                                                        SHA256

                                                                                                        9aedfe723bb8d308a491dc8ce1ecaac45f22208df14a358fe0ee10fe180ea78f

                                                                                                        SHA512

                                                                                                        b294daac3e886713ea1fb04cb3bd9db7ac093f3fa4c4ec9b94d5f9c4e633b1ab9db3e7d88bebd945bc0efbc4486f186bbf7fbfe5ce57c45041e4288e155f83f1

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\stdidscq.default-release\targeting.snapshot.json

                                                                                                        Filesize

                                                                                                        3KB

                                                                                                        MD5

                                                                                                        2747d711f0d7b38e8c7b9ead31b1659e

                                                                                                        SHA1

                                                                                                        6d0475849c0d411adfe118035336a2ac50ccb980

                                                                                                        SHA256

                                                                                                        0528a84c4a2a71f6fff90b928a1105869257318ae472c8870d4938b3e4fce619

                                                                                                        SHA512

                                                                                                        7d7705866e5e664ab8fdb7d7f30d821d973f265a3c2ccb68db9f957a1edc36e1ed97a7bfdd49222cabd11975045170ec355eeb54d4b03032f06b14900f25c151

                                                                                                      • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\stdidscq.default-release\xulstore.json

                                                                                                        Filesize

                                                                                                        141B

                                                                                                        MD5

                                                                                                        1995825c748914809df775643764920f

                                                                                                        SHA1

                                                                                                        55c55d77bb712d2d831996344f0a1b3e0b7ff98a

                                                                                                        SHA256

                                                                                                        87835b1bd7d0934f997ef51c977349809551d47e32c3c9224899359ae0fce776

                                                                                                        SHA512

                                                                                                        c311970610d836550a07feb47bd0774fd728130d0660cbada2d2d68f2fcfbe84e85404d7f5b8ab0f71a6c947561dcffa95df2782a712f4dcb7230ea8ba01c34c

                                                                                                      • memory/224-3889-0x000002E1FB5A0000-0x000002E1FB5C0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/224-3884-0x000002E1FB1D0000-0x000002E1FB1F0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/224-3887-0x000002E1FB190000-0x000002E1FB1B0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/992-780-0x000001F6EBB20000-0x000001F6EBB40000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/992-782-0x000001F6EB7D0000-0x000001F6EB7F0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/992-798-0x000001F6EBF20000-0x000001F6EBF40000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/992-807-0x000001F6EBE00000-0x000001F6EBE20000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/992-821-0x000001EEEA000000-0x000001EEEA77A000-memory.dmp

                                                                                                        Filesize

                                                                                                        7.5MB

                                                                                                      • memory/1240-3758-0x0000000004EC0000-0x0000000004EC1000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/1528-3877-0x0000000004A90000-0x0000000004A91000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/1804-875-0x0000000003EC0000-0x0000000003EC1000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/2344-398-0x0000000004C40000-0x0000000004C41000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/3276-3839-0x000002075FB20000-0x000002075FB40000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/3276-3841-0x000002075F7E0000-0x000002075F800000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/3276-3843-0x000002075FEF0000-0x000002075FF10000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/3420-3862-0x00000243852F0000-0x0000024385310000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/3420-3865-0x00000243852B0000-0x00000243852D0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/3420-3867-0x00000243858C0000-0x00000243858E0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/3956-3743-0x0000020844E00000-0x0000020844E20000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/3956-3745-0x0000020844BC0000-0x0000020844BE0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/3956-3747-0x00000208451D0000-0x00000208451F0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/4316-249-0x000002A4B7230000-0x000002A4B7250000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/4316-251-0x000002A4B71F0000-0x000002A4B7210000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/4316-252-0x000002A4B7800000-0x000002A4B7820000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/4536-933-0x000001BC7A200000-0x000001BC7A97A000-memory.dmp

                                                                                                        Filesize

                                                                                                        7.5MB

                                                                                                      • memory/4536-881-0x000001C47CE90000-0x000001C47CEB0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/4536-884-0x000001C47CE50000-0x000001C47CE70000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/4536-886-0x000001C47D260000-0x000001C47D280000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/5060-306-0x000000000BD10000-0x000000000BF29000-memory.dmp

                                                                                                        Filesize

                                                                                                        2.1MB

                                                                                                      • memory/5060-237-0x0000000004170000-0x0000000004171000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/5244-3832-0x0000000003F10000-0x0000000003F11000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/5260-3855-0x0000000003720000-0x0000000003721000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/5260-3769-0x000002F957740000-0x000002F957760000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/5260-3765-0x000002F957370000-0x000002F957390000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/5260-3767-0x000002F957330000-0x000002F957350000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/5400-3896-0x0000000004B80000-0x0000000004B81000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/5432-3907-0x0000020E25310000-0x0000020E25330000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/5432-3905-0x0000020E24F00000-0x0000020E24F20000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/5432-3903-0x0000020E24F40000-0x0000020E24F60000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/5448-3736-0x0000000004400000-0x0000000004401000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/5504-644-0x00000000044A0000-0x00000000044A1000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/5620-662-0x0000021D84800000-0x0000021D84F7A000-memory.dmp

                                                                                                        Filesize

                                                                                                        7.5MB

                                                                                                      • memory/5620-636-0x0000021D860D0000-0x0000021D860F0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/5620-638-0x0000021D86090000-0x0000021D860B0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/5620-640-0x0000021D864A0000-0x0000021D864C0000-memory.dmp

                                                                                                        Filesize

                                                                                                        128KB

                                                                                                      • memory/5620-647-0x0000021D84800000-0x0000021D84F7A000-memory.dmp

                                                                                                        Filesize

                                                                                                        7.5MB

                                                                                                      • memory/6508-381-0x00000000047E0000-0x00000000047E1000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB

                                                                                                      • memory/6804-759-0x0000000004B00000-0x0000000004B01000-memory.dmp

                                                                                                        Filesize

                                                                                                        4KB