Malware Analysis Report

2025-03-15 03:45

Sample ID 241103-14x7bawfpr
Target https://mega.nz/file/4nlwxAqL#SRB6SE9FtsJVXmVM_OuUWGUL2GJM7t2fe08Ym2dbty8
Tags
exelastealer collection defense_evasion discovery evasion persistence privilege_escalation pyinstaller spyware stealer upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

Threat Level: Known bad

The file https://mega.nz/file/4nlwxAqL#SRB6SE9FtsJVXmVM_OuUWGUL2GJM7t2fe08Ym2dbty8 was found to be: Known bad.

Malicious Activity Summary

exelastealer collection defense_evasion discovery evasion persistence privilege_escalation pyinstaller spyware stealer upx

Exela Stealer

Exelastealer family

Grants admin privileges

Modifies Windows Firewall

Loads dropped DLL

Executes dropped EXE

Reads user/profile data of web browsers

Clipboard Data

Network Service Discovery

Looks up external IP address via web service

Legitimate hosting services abused for malware hosting/C2

Hide Artifacts: Hidden Files and Directories

UPX packed file

Enumerates processes with tasklist

Launches sc.exe

Permission Groups Discovery: Local Groups

Event Triggered Execution: Netsh Helper DLL

System Network Configuration Discovery: Wi-Fi Discovery

System Network Connections Discovery

Browser Information Discovery

Detects Pyinstaller

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Views/modifies file attributes

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Runs net.exe

NTFS ADS

Enumerates system info in registry

Suspicious use of AdjustPrivilegeToken

Kills process with taskkill

Suspicious use of FindShellTrayWindow

Gathers system information

Modifies data under HKEY_USERS

Collects information from the system

Gathers network information

Suspicious use of SendNotifyMessage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-03 22:12

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-03 22:12

Reported

2024-11-03 22:15

Platform

win10v2004-20241007-en

Max time kernel

139s

Max time network

149s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://mega.nz/file/4nlwxAqL#SRB6SE9FtsJVXmVM_OuUWGUL2GJM7t2fe08Ym2dbty8

Signatures

Exela Stealer

stealer exelastealer

Exelastealer family

exelastealer

Grants admin privileges

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A
N/A N/A C:\Windows\system32\netsh.exe N/A
N/A N/A C:\Windows\system32\netsh.exe N/A
N/A N/A C:\Windows\system32\netsh.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A
N/A N/A C:\Users\Admin\Downloads\Tools.exe N/A

Reads user/profile data of web browsers

spyware stealer

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Network Service Discovery

discovery
Description Indicator Process Target
N/A N/A C:\Windows\system32\ARP.EXE N/A
N/A N/A C:\Windows\system32\cmd.exe N/A
N/A N/A C:\Windows\system32\ARP.EXE N/A
N/A N/A C:\Windows\system32\cmd.exe N/A

Hide Artifacts: Hidden Files and Directories

defense_evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\cmd.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Launches sc.exe

Description Indicator Process Target
N/A N/A C:\Windows\system32\sc.exe N/A
N/A N/A C:\Windows\system32\sc.exe N/A

Browser Information Discovery

discovery

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Event Triggered Execution: Netsh Helper DLL

persistence privilege_escalation
Description Indicator Process Target
Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A
Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh C:\Windows\system32\netsh.exe N/A

Permission Groups Discovery: Local Groups

discovery

System Network Configuration Discovery: Wi-Fi Discovery

discovery
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A
N/A N/A C:\Windows\system32\cmd.exe N/A
N/A N/A C:\Windows\system32\netsh.exe N/A
N/A N/A C:\Windows\system32\cmd.exe N/A

System Network Connections Discovery

discovery
Description Indicator Process Target
N/A N/A C:\Windows\system32\NETSTAT.EXE N/A
N/A N/A C:\Windows\system32\NETSTAT.EXE N/A

Collects information from the system

Description Indicator Process Target
N/A N/A C:\Windows\System32\Wbem\WMIC.exe N/A
N/A N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Gathers network information

Description Indicator Process Target
N/A N/A C:\Windows\system32\NETSTAT.EXE N/A
N/A N/A C:\Windows\system32\ipconfig.exe N/A
N/A N/A C:\Windows\system32\NETSTAT.EXE N/A
N/A N/A C:\Windows\system32\ipconfig.exe N/A

Gathers system information

Description Indicator Process Target
N/A N/A C:\Windows\system32\systeminfo.exe N/A
N/A N/A C:\Windows\system32\systeminfo.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133751456556276364" C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry C:\Program Files\Google\Chrome\Application\chrome.exe N/A

NTFS ADS

Description Indicator Process Target
File opened for modification C:\Users\Admin\Downloads\Unconfirmed 155876.crdownload:SmartScreen C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Runs net.exe

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: 33 N/A C:\Windows\system32\AUDIODG.EXE N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\system32\AUDIODG.EXE N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\tasklist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2044 wrote to memory of 1960 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 1960 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 456 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5088 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5100 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5100 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5100 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5100 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5100 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5100 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5100 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5100 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5100 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5100 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5100 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5100 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5100 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5100 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5100 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5100 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5100 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5100 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5100 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2044 wrote to memory of 5100 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://mega.nz/file/4nlwxAqL#SRB6SE9FtsJVXmVM_OuUWGUL2GJM7t2fe08Ym2dbty8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc7dda46f8,0x7ffc7dda4708,0x7ffc7dda4718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2532 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5196 /prefetch:8

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x300 0x494

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5676 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6420 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6192 /prefetch:8

C:\Users\Admin\Downloads\Tools.exe

"C:\Users\Admin\Downloads\Tools.exe"

C:\Users\Admin\Downloads\Tools.exe

"C:\Users\Admin\Downloads\Tools.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Users\Admin\Downloads\Tools.exe

"C:\Users\Admin\Downloads\Tools.exe"

C:\Users\Admin\Downloads\Tools.exe

"C:\Users\Admin\Downloads\Tools.exe"

C:\Users\Admin\Downloads\Tools.exe

"C:\Users\Admin\Downloads\Tools.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "tasklist"

C:\Users\Admin\Downloads\Tools.exe

"C:\Users\Admin\Downloads\Tools.exe"

C:\Windows\System32\Wbem\WMIC.exe

wmic csproduct get uuid

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Users\Admin\Downloads\Tools.exe

"C:\Users\Admin\Downloads\Tools.exe"

C:\Users\Admin\Downloads\Tools.exe

"C:\Users\Admin\Downloads\Tools.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Users\Admin\Downloads\Tools.exe

"C:\Users\Admin\Downloads\Tools.exe"

C:\Users\Admin\Downloads\Tools.exe

"C:\Users\Admin\Downloads\Tools.exe"

C:\Users\Admin\Downloads\Tools.exe

"C:\Users\Admin\Downloads\Tools.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Users\Admin\Downloads\Tools.exe

"C:\Users\Admin\Downloads\Tools.exe"

C:\Users\Admin\Downloads\Tools.exe

"C:\Users\Admin\Downloads\Tools.exe"

C:\Users\Admin\Downloads\Tools.exe

"C:\Users\Admin\Downloads\Tools.exe"

C:\Users\Admin\Downloads\Tools.exe

"C:\Users\Admin\Downloads\Tools.exe"

C:\Users\Admin\Downloads\Tools.exe

"C:\Users\Admin\Downloads\Tools.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe""

C:\Windows\system32\attrib.exe

attrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "tasklist"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\mshta.exe

mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 2044"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 2044

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1960"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 1960

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 456"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 456

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 5088"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 5088

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 5100"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 5100

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4896"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 4896

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4848"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 4848

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 3984"

C:\Windows\System32\Conhost.exe

\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

C:\Windows\system32\taskkill.exe

taskkill /F /PID 3984

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4236"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 4236

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4652"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 4652

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4960"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 4960

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"

C:\Windows\system32\cmd.exe

cmd.exe /c chcp

C:\Windows\system32\tasklist.exe

tasklist /FO LIST

C:\Windows\system32\cmd.exe

cmd.exe /c chcp

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe Get-Clipboard

C:\Windows\system32\chcp.com

chcp

C:\Windows\system32\chcp.com

chcp

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"

C:\Windows\system32\systeminfo.exe

systeminfo

C:\Windows\system32\netsh.exe

netsh wlan show profiles

C:\Windows\system32\HOSTNAME.EXE

hostname

C:\Windows\System32\Wbem\WMIC.exe

wmic logicaldisk get caption,description,providername

C:\Windows\system32\net.exe

net user

C:\Windows\system32\net1.exe

C:\Windows\system32\net1 user

C:\Windows\system32\query.exe

query user

C:\Windows\system32\quser.exe

"C:\Windows\system32\quser.exe"

C:\Windows\system32\net.exe

net localgroup

C:\Windows\system32\net1.exe

C:\Windows\system32\net1 localgroup

C:\Windows\system32\net.exe

net localgroup administrators

C:\Windows\system32\net1.exe

C:\Windows\system32\net1 localgroup administrators

C:\Windows\system32\net.exe

net user guest

C:\Windows\system32\net1.exe

C:\Windows\system32\net1 user guest

C:\Windows\system32\net.exe

net user administrator

C:\Windows\system32\net1.exe

C:\Windows\system32\net1 user administrator

C:\Windows\System32\Wbem\WMIC.exe

wmic startup get caption,command

C:\Windows\system32\tasklist.exe

tasklist /svc

C:\Windows\system32\ipconfig.exe

ipconfig /all

C:\Windows\system32\ROUTE.EXE

route print

C:\Windows\system32\backgroundTaskHost.exe

"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca

C:\Windows\system32\ARP.EXE

arp -a

C:\Windows\system32\NETSTAT.EXE

netstat -ano

C:\Windows\system32\sc.exe

sc query type= service state= all

C:\Windows\system32\netsh.exe

netsh firewall show state

C:\Windows\system32\netsh.exe

netsh firewall show config

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"

C:\Windows\System32\Wbem\WMIC.exe

wmic csproduct get uuid

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"

C:\Windows\System32\Wbem\WMIC.exe

wmic csproduct get uuid

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffc7dd9cc40,0x7ffc7dd9cc4c,0x7ffc7dd9cc58

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1968,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1964 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2240 /prefetch:3

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2304,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2516 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3216,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3208 /prefetch:1

C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3712,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4572 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4720,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4736 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4844,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4852 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4952,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5052 /prefetch:8

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4896,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4880 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5356,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5116 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc6dad46f8,0x7ffc6dad4708,0x7ffc6dad4718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3928 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3552 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5736 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6172 /prefetch:8

C:\Users\Admin\Downloads\Tools.exe

"C:\Users\Admin\Downloads\Tools.exe"

C:\Users\Admin\Downloads\Tools.exe

"C:\Users\Admin\Downloads\Tools.exe"

C:\Users\Admin\Downloads\Tools.exe

"C:\Users\Admin\Downloads\Tools.exe"

C:\Users\Admin\Downloads\Tools.exe

"C:\Users\Admin\Downloads\Tools.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "tasklist"

C:\Windows\System32\Wbem\WMIC.exe

wmic csproduct get uuid

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "tasklist"

C:\Windows\system32\mshta.exe

mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()"

C:\Windows\system32\tasklist.exe

tasklist

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4540"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 4540

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1884"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 1884

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1416"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 1416

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 2036"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 2036

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 2112"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 2112

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4444"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 4444

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 6120"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 6120

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1436"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 1436

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 5908"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 5908

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 5044"

C:\Windows\System32\Conhost.exe

\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

C:\Windows\system32\taskkill.exe

taskkill /F /PID 5044

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 5380"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 5380

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1596"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 1596

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4000"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 4000

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1272"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 1272

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4868"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 4868

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4932"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 4932

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1284"

C:\Windows\system32\taskkill.exe

taskkill /F /PID 1284

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"

C:\Windows\system32\cmd.exe

cmd.exe /c chcp

C:\Windows\system32\chcp.com

chcp

C:\Windows\system32\cmd.exe

cmd.exe /c chcp

C:\Windows\system32\chcp.com

chcp

C:\Windows\system32\tasklist.exe

tasklist /FO LIST

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell.exe Get-Clipboard

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"

C:\Windows\system32\systeminfo.exe

systeminfo

C:\Windows\system32\netsh.exe

netsh wlan show profiles

C:\Windows\system32\HOSTNAME.EXE

hostname

C:\Windows\System32\Wbem\WMIC.exe

wmic logicaldisk get caption,description,providername

C:\Windows\system32\net.exe

net user

C:\Windows\system32\net1.exe

C:\Windows\system32\net1 user

C:\Windows\system32\query.exe

query user

C:\Windows\system32\quser.exe

"C:\Windows\system32\quser.exe"

C:\Windows\system32\net.exe

net localgroup

C:\Windows\system32\net1.exe

C:\Windows\system32\net1 localgroup

C:\Windows\system32\net.exe

net localgroup administrators

C:\Windows\system32\net1.exe

C:\Windows\system32\net1 localgroup administrators

C:\Windows\system32\net.exe

net user guest

C:\Windows\system32\net1.exe

C:\Windows\system32\net1 user guest

C:\Windows\system32\net.exe

net user administrator

C:\Windows\system32\net1.exe

C:\Windows\system32\net1 user administrator

C:\Windows\System32\Wbem\WMIC.exe

wmic startup get caption,command

C:\Windows\system32\tasklist.exe

tasklist /svc

C:\Windows\system32\ipconfig.exe

ipconfig /all

C:\Windows\system32\ROUTE.EXE

route print

C:\Windows\system32\ARP.EXE

arp -a

C:\Windows\system32\NETSTAT.EXE

netstat -ano

C:\Windows\system32\sc.exe

sc query type= service state= all

C:\Windows\system32\netsh.exe

netsh firewall show state

C:\Windows\system32\netsh.exe

netsh firewall show config

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"

C:\Windows\System32\Wbem\WMIC.exe

wmic csproduct get uuid

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"

C:\Windows\System32\Wbem\WMIC.exe

wmic csproduct get uuid

Network

Country Destination Domain Proto
US 8.8.8.8:53 mega.nz udp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
LU 31.216.144.5:443 mega.nz tcp
LU 31.216.144.5:443 mega.nz tcp
LU 31.216.144.5:443 mega.nz tcp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 5.144.216.31.in-addr.arpa udp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
LU 31.216.144.5:443 mega.nz tcp
US 8.8.8.8:53 eu.static.mega.co.nz udp
LU 66.203.124.37:443 eu.static.mega.co.nz tcp
LU 66.203.124.37:443 eu.static.mega.co.nz tcp
US 8.8.8.8:53 37.124.203.66.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 g.api.mega.co.nz udp
LU 66.203.125.14:443 g.api.mega.co.nz tcp
LU 66.203.125.14:443 g.api.mega.co.nz tcp
US 8.8.8.8:53 14.125.203.66.in-addr.arpa udp
LU 66.203.124.37:443 eu.static.mega.co.nz tcp
N/A 127.0.0.1:6341 tcp
N/A 127.0.0.1:6341 tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 gfs214n165.userstorage.mega.co.nz udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
ES 185.206.27.75:443 gfs214n165.userstorage.mega.co.nz tcp
ES 185.206.27.75:443 gfs214n165.userstorage.mega.co.nz tcp
ES 185.206.27.75:443 gfs214n165.userstorage.mega.co.nz tcp
ES 185.206.27.75:443 gfs214n165.userstorage.mega.co.nz tcp
ES 185.206.27.75:443 gfs214n165.userstorage.mega.co.nz tcp
ES 185.206.27.75:443 gfs214n165.userstorage.mega.co.nz tcp
US 8.8.8.8:53 75.27.206.185.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
N/A 127.0.0.1:62725 tcp
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
N/A 127.0.0.1:63484 tcp
N/A 127.0.0.1:63488 tcp
N/A 127.0.0.1:63490 tcp
US 8.8.8.8:53 discord.com udp
US 162.159.137.232:443 discord.com tcp
US 162.159.137.232:443 discord.com tcp
US 8.8.8.8:53 232.137.159.162.in-addr.arpa udp
US 8.8.8.8:53 www.google.com udp
GB 142.250.179.228:443 www.google.com udp
US 8.8.8.8:53 3.213.58.216.in-addr.arpa udp
US 8.8.8.8:53 10.213.58.216.in-addr.arpa udp
US 8.8.8.8:53 227.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 228.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 ogads-pa.googleapis.com udp
US 8.8.8.8:53 apis.google.com udp
GB 216.58.201.110:443 apis.google.com udp
GB 172.217.169.10:443 ogads-pa.googleapis.com udp
GB 172.217.169.10:443 ogads-pa.googleapis.com tcp
US 8.8.8.8:53 110.201.58.216.in-addr.arpa udp
US 8.8.8.8:53 10.169.217.172.in-addr.arpa udp
US 8.8.8.8:53 play.google.com udp
GB 172.217.16.238:443 play.google.com udp
GB 172.217.16.238:443 play.google.com tcp
US 8.8.8.8:53 238.16.217.172.in-addr.arpa udp
US 8.8.8.8:53 clients2.google.com udp
GB 142.250.178.14:443 clients2.google.com udp
GB 142.250.178.14:443 clients2.google.com tcp
US 8.8.8.8:53 api.gofile.io udp
FR 45.112.123.126:443 api.gofile.io tcp
US 8.8.8.8:53 14.178.250.142.in-addr.arpa udp
N/A 127.0.0.1:63688 tcp
N/A 127.0.0.1:63690 tcp
US 8.8.8.8:53 store1.gofile.io udp
US 8.8.8.8:53 126.123.112.45.in-addr.arpa udp
FR 45.112.123.227:443 store1.gofile.io tcp
US 8.8.8.8:53 227.123.112.45.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 162.159.137.232:443 discord.com tcp
US 8.8.8.8:53 mega.nz udp
LU 31.216.145.5:443 mega.nz tcp
LU 31.216.145.5:443 mega.nz tcp
LU 66.203.125.14:443 g.api.mega.co.nz tcp
LU 66.203.125.14:443 g.api.mega.co.nz tcp
US 8.8.8.8:53 5.145.216.31.in-addr.arpa udp
N/A 127.0.0.1:6341 tcp
N/A 127.0.0.1:6341 tcp
ES 185.206.27.75:443 gfs214n165.userstorage.mega.co.nz tcp
ES 185.206.27.75:443 gfs214n165.userstorage.mega.co.nz tcp
ES 185.206.27.75:443 gfs214n165.userstorage.mega.co.nz tcp
ES 185.206.27.75:443 gfs214n165.userstorage.mega.co.nz tcp
N/A 127.0.0.1:54019 tcp
US 208.95.112.1:80 ip-api.com tcp
N/A 127.0.0.1:54055 tcp
N/A 127.0.0.1:54057 tcp
N/A 127.0.0.1:54059 tcp
US 162.159.137.232:443 discord.com tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 162.159.137.232:443 discord.com tcp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp
FR 45.112.123.126:443 api.gofile.io tcp
FR 45.112.123.227:443 store1.gofile.io tcp
N/A 127.0.0.1:51128 tcp
N/A 127.0.0.1:51130 tcp
US 162.159.137.232:443 discord.com tcp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 34d2c4f40f47672ecdf6f66fea242f4a
SHA1 4bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256 b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA512 50fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6

\??\pipe\LOCAL\crashpad_2044_QEAMMNHUPQNYNFPJ

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 8749e21d9d0a17dac32d5aa2027f7a75
SHA1 a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256 915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512 c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 a8d28e983cb5e081fc0a72d9c69e57a2
SHA1 69d0819f10443312ee6dd9bacf0f33b724bd61be
SHA256 ccf89c2cd8a5da224016fcf93080766e4f6e8c1959ab83c3fc1d59d35e75be06
SHA512 b23cad8867ab999abe4704c115bd6023b8b9326f81abfa30413414701b0b45078b815f9bbe768b4fc32ffb5d77dd3cdcdc459803c79deba786a44f65a3c94f9c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001

MD5 5af87dfd673ba2115e2fcf5cfdb727ab
SHA1 d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256 f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512 de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 13c2411f6efb59ada139e387e49fc1bf
SHA1 7fc85a382b76585af4d1dc451cae8d5528bad3a9
SHA256 c2f86f8209efe938e3f507165ce6141a9bfa3fddb9f1962a1a043f16a4709d4f
SHA512 b0c442174cc6389e72a2bfb78ac68157d7f3e63648aeb604bcaf4ed07ccd3df86ad3de1c8f53bd857edbf1aa8edd3da229a73461fb07f1adc7b0bc1b2fd60913

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 6d67599d6b098b226a376e2a17931b11
SHA1 4143f230bad0fe043651165da0b6aa98ed73de4c
SHA256 51941f833d15a4036f9951444e076b448639f097ed881bd4bb2e8da8cbcdec19
SHA512 202b3c9acfb36a314aea60abc1692f11f6c8bbd45100fff61228f6e1b8e05f3c484ed93403dd0e9e60216ed5a9aa031880adeff0d2fd2545d5c51868a9b526fb

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000023

MD5 950eca48e414acbe2c3b5d046dcb8521
SHA1 1731f264e979f18cdf08c405c7b7d32789a6fb59
SHA256 c0bbe530abfce19e06697bc4358eb426e076ccdb9113e22df4a6f32085da67a2
SHA512 27e55525ade4d099a6881011f6e2e0d5d3a9ca7181f4f014dc231d40b3b1907d0d437b0c44d336c25dd7b73209cd773b8563675ac260c43c7752e2d2d694d4d9

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 1fd63e52b03b1a5ccf7cfd57b41cfd29
SHA1 f34d88fe127a339cc5de7b4eefdc2ec6b03866f9
SHA256 fd96dc29e789b571be51e31bad5609ba45c8c1ab0940d74cfac224d9eeb2aefc
SHA512 3e4c475dde775752e6b51dc3917fd3c0cf3e47970c22e5400dba35505ef9d9b9941d16285027856c2074f856d42050d51e15df4ae5057a598ba6f9738da5f810

C:\Users\Admin\Downloads\Tools.exe

MD5 9ef872cbbbbc5bb4b1ee521ef0203930
SHA1 a0be1aff9a8feec9f847e6d1ef2a1f41eb5c062d
SHA256 41d0d7f4aeb95e0ef2b69f00b443b82f9cfab03dd47ca80cbb61ac8ae9b714ea
SHA512 4e250cd530e00b302082579fca6ae2a2d44058e5a288fc5fe809a040866702da84305060ced7f6fa89210e1e5811391142e4a4fe1917c71d60583378f4446dc1

C:\Users\Admin\AppData\Local\Temp\_MEI55562\python311.dll

MD5 db09c9bbec6134db1766d369c339a0a1
SHA1 c156d9f2d0e80b4cf41794cd9b8b1e8a352e0a0b
SHA256 b1aac1e461174bbae952434e4dac092590d72b9832a04457c94bd9bb7ee8ad79
SHA512 653a7fff6a2b6bffb9ea2c0b72ddb83c9c53d555e798eea47101b0d932358180a01af2b9dab9c27723057439c1eaffb8d84b9b41f6f9cd1c3c934f1794104d45

C:\Users\Admin\AppData\Local\Temp\_MEI55562\VCRUNTIME140.dll

MD5 f12681a472b9dd04a812e16096514974
SHA1 6fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256 d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA512 7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

memory/5868-248-0x00007FFC6A030000-0x00007FFC6A618000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI55562\python3.DLL

MD5 34e49bb1dfddf6037f0001d9aefe7d61
SHA1 a25a39dca11cdc195c9ecd49e95657a3e4fe3215
SHA256 4055d1b9e553b78c244143ab6b48151604003b39a9bf54879dee9175455c1281
SHA512 edb715654baaf499cf788bcacd5657adcf9f20b37b02671abe71bda334629344415ed3a7e95cb51164e66a7aa3ed4bf84acb05649ccd55e3f64036f3178b7856

C:\Users\Admin\AppData\Local\Temp\_MEI55562\base_library.zip

MD5 2a138e2ee499d3ba2fc4afaef93b7caa
SHA1 508c733341845e94fce7c24b901fc683108df2a8
SHA256 130e506ead01b91b60d6d56072c468aeb5457dd0f2ecd6ce17dfcbb7d51a1f8c
SHA512 1f61a0fda5676e8ed8d10dfee78267f6d785f9c131f5caf2dd984e18ca9e5866b7658ab7edb2ffd74920a40ffea5cd55c0419f5e9ee57a043105e729e10d820b

C:\Users\Admin\AppData\Local\Temp\_MEI55562\libffi-8.dll

MD5 decbba3add4c2246928ab385fb16a21e
SHA1 5f019eff11de3122ffa67a06d52d446a3448b75e
SHA256 4b43c1e42f6050ddb8e184c8ec4fb1de4a6001e068ece8e6ad47de0cc9fd4a2d
SHA512 760a42a3eb3ca13fa7b95d3bd0f411c270594ae3cf1d3cda349fa4f8b06ebe548b60cd438d68e2da37de0bc6f1c711823f5e917da02ed7047a45779ee08d7012

memory/5868-277-0x00007FFC7D800000-0x00007FFC7D80F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI55562\_uuid.pyd

MD5 3377ae26c2987cfee095dff160f2c86c
SHA1 0ca6aa60618950e6d91a7dea530a65a1cdf16625
SHA256 9534cb9c997a17f0004fb70116e0141bdd516373b37bbd526d91ad080daa3a2b
SHA512 8e408b84e2130ff48b8004154d1bdf6a08109d0b40f9fafb6f55e9f215e418e05dca819f411c802792a9d9936a55d6b90460121583e5568579a0fda6935852ee

memory/5868-285-0x00007FFC6AC40000-0x00007FFC6AC6D000-memory.dmp

memory/5868-289-0x00007FFC69EB0000-0x00007FFC6A023000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI55562\sqlite3.dll

MD5 895f001ae969364432372329caf08b6a
SHA1 4567fc6672501648b277fe83e6b468a7a2155ddf
SHA256 f5dd29e1e99cf8967f7f81487dc624714dcbec79c1630f929d5507fc95cbfad7
SHA512 05b4559d283ea84174da72a6c11b8b93b1586b4e7d8cda8d745c814f8f6dff566e75f9d7890f32bd9dfe43485244973860f83f96ba39296e28127c9396453261

C:\Users\Admin\AppData\Local\Temp\_MEI55562\libcrypto-1_1.dll

MD5 86cfc84f8407ab1be6cc64a9702882ef
SHA1 86f3c502ed64df2a5e10b085103c2ffc9e3a4130
SHA256 11b89cc5531b2a6b89fbbb406ebe8fb01f0bf789e672131b0354e10f9e091307
SHA512 b33f59497127cb1b4c1781693380576187c562563a9e367ce8abc14c97c51053a28af559cdd8bd66181012083e562c8a8771e3d46adeba269a848153a8e9173c

memory/5868-296-0x00007FFC69DF0000-0x00007FFC69EA8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI55562\_asyncio.pyd

MD5 1b8ce772a230a5da8cbdccd8914080a5
SHA1 40d4faf1308d1af6ef9f3856a4f743046fd0ead5
SHA256 fa5a1e7031de5849ab2ab5a177e366b41e1df6bbd90c8d2418033a01c740771f
SHA512 d2fc21b9f58b57065b337c3513e7e6c3e2243b73c5a230e81c91dafcb6724b521ad766667848ba8d0a428d530691ffc4020de6ce9ce1eaa2bf5e15338114a603

C:\Users\Admin\AppData\Local\Temp\_MEI55562\_hashlib.pyd

MD5 0629bdb5ff24ce5e88a2ddcede608aee
SHA1 47323370992b80dafb6f210b0d0229665b063afb
SHA256 f404bb8371618bbd782201f092a3bcd7a96d3c143787ebea1d8d86ded1f4b3b8
SHA512 3faeff1a19893257c17571b89963af37534c189421585ea03dd6a3017d28803e9d08b0e4daceee01ffeda21da60e68d10083fe7dbdbbde313a6b489a40e70952

C:\Users\Admin\AppData\Local\Temp\_MEI55562\yarl\_quoting_c.cp311-win_amd64.pyd

MD5 1fa0ad3deb7f851a231c1a973b121b93
SHA1 65ae7bb5fec98da8665c70290c40082c8358b688
SHA256 0054d20391ebcd1ed30ef2d5aaa1efbbc5aceb7d8f716c16de0ac0d9d2680121
SHA512 64b6cf9d90daca0fb5e2d0eb91c853edaa2fb90edea064b96032ce968ee46961464772e353bf503e05b05471330c5afc8ffc72273e6ebdb6b1ad22fbce331fbf

memory/5868-310-0x00007FFC6A8D0000-0x00007FFC6A8F2000-memory.dmp

memory/5868-312-0x00007FFC6A790000-0x00007FFC6A7AB000-memory.dmp

memory/5868-315-0x00007FFC6A750000-0x00007FFC6A769000-memory.dmp

memory/5868-319-0x00007FFC6A6E0000-0x00007FFC6A6F1000-memory.dmp

memory/5868-325-0x00007FFC6A6C0000-0x00007FFC6A6DE000-memory.dmp

memory/5868-324-0x00007FFC69A70000-0x00007FFC69DE5000-memory.dmp

memory/5868-323-0x00007FFC69DF0000-0x00007FFC69EA8000-memory.dmp

memory/5868-326-0x00007FFC692E0000-0x00007FFC69A6A000-memory.dmp

memory/5868-322-0x00007FFC772A0000-0x00007FFC772AA000-memory.dmp

memory/5868-321-0x00000170714B0000-0x0000017071825000-memory.dmp

memory/5868-320-0x00007FFC6ABE0000-0x00007FFC6AC0E000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index

MD5 af2f393581b8e80d65dcaf770bb8e53a
SHA1 aace74f455d781eccb1dd93cd87b37fa53371a75
SHA256 f852eede99089c9d275b5e1eac64f5882dec08b7aba7b8c1db6b1666f1fd769a
SHA512 fde646388c2c87cedbdda0830512e6fd8f8431df2cc29b366ed6e0cc34f7922ba705e59ae36afa48ac70ab89ac4fd93c799c3eaa3661eeec35f21e288c166283

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57e61a.TMP

MD5 4559408479ebabea512b6c1e4886b99e
SHA1 9fa8548ed4116d35cd25c77081a518e42ef40b3a
SHA256 8576e8d04503f481016a4087ba1be5f5b466e366d1b551f61f5cf9f3b527ce4c
SHA512 bbc2d14102229e4a980c056b5a794f4b259f6338bb9339b89c23a88a7bbf5acaf74976cbcd70834b69ec8f7871c76feab53e89bdb07cbed6ecdc00a94199ceb8

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 1153120355d3b6b89e8d04b59ca7fdad
SHA1 fddd22d01fdb2e495549d597352a24b437a7d309
SHA256 b00fdb83fdc1992617eacc6b9fdfe31ae3ec5c68b3d86a5eee2316234df739d7
SHA512 0cd3895693091160567defa0a8ff4f6b93139ef680a291b30375387a706828c08e44a959e8f680287655da7677450b1b5bb984ea1b45686fd60dcea141303e17

memory/5708-427-0x00007FFC68CF0000-0x00007FFC692D8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI57442\attrs-24.2.0.dist-info\INSTALLER

MD5 365c9bfeb7d89244f2ce01c1de44cb85
SHA1 d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256 ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512 d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

memory/5708-445-0x00007FFC686D0000-0x00007FFC686F4000-memory.dmp

memory/5708-448-0x00007FFC6F7D0000-0x00007FFC6F7DD000-memory.dmp

memory/5708-449-0x00007FFC686B0000-0x00007FFC686C9000-memory.dmp

memory/5708-452-0x00007FFC68650000-0x00007FFC68673000-memory.dmp

memory/5708-451-0x00007FFC684D0000-0x00007FFC68643000-memory.dmp

memory/5708-450-0x00007FFC68680000-0x00007FFC686AD000-memory.dmp

memory/5708-462-0x00007FFC684A0000-0x00007FFC684CE000-memory.dmp

memory/6052-467-0x00007FFC67E00000-0x00007FFC67E2E000-memory.dmp

memory/5708-473-0x00007FFC671A0000-0x00007FFC672BC000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI55642\unicodedata.pyd

MD5 06a5e52caf03426218f0c08fc02cc6b8
SHA1 ae232c63620546716fbb97452d73948ebfd06b35
SHA256 118c31faa930f2849a14c3133df36420a5832114df90d77b09cde0ad5f96f33a
SHA512 546b1a01f36d3689b0fdeeda8b1ce55e7d3451731ca70fffe6627d542fff19d7a70e27147cab1920aae8bed88272342908d4e9d671d7aba74abb5db398b90718

memory/5708-579-0x00007FFC684D0000-0x00007FFC68643000-memory.dmp

memory/5824-578-0x00007FFC65720000-0x00007FFC65D08000-memory.dmp

memory/5824-590-0x00007FFC66B00000-0x00007FFC66B24000-memory.dmp

memory/6052-589-0x00007FFC679C0000-0x00007FFC67A78000-memory.dmp

memory/5708-588-0x00007FFC68650000-0x00007FFC68673000-memory.dmp

memory/5824-587-0x00007FFC680C0000-0x00007FFC680CD000-memory.dmp

memory/5708-581-0x00007FFC67EF0000-0x00007FFC67FA8000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 d9e73c1c707edf3819f9609a0fe5b618
SHA1 8e4b2c3bb54cd75cf264a796de860b48a3963016
SHA256 35657e468f476c7489a9cab3df6c35918d986e8e8739c2d4d538cf813c4f62f9
SHA512 176eabd010519c89277fecd48c23097ad3a03f9c02760f35cd3d2d2170e9e1f3b39729ad37f927d937afcf73c77732796ca2898038d4b9c9ffe87571dae66527

memory/5708-816-0x00007FFC630B0000-0x00007FFC630E7000-memory.dmp

memory/5708-815-0x00007FFC642A0000-0x00007FFC64A2A000-memory.dmp

memory/6052-847-0x00007FFC63700000-0x00007FFC63E8A000-memory.dmp

memory/6052-848-0x00007FFC62A60000-0x00007FFC62A97000-memory.dmp

memory/5824-884-0x00007FFC65720000-0x00007FFC65D08000-memory.dmp

memory/6052-846-0x00007FFC63E90000-0x00007FFC63EAE000-memory.dmp

memory/6052-845-0x00007FFC67880000-0x00007FFC6788A000-memory.dmp

memory/6052-844-0x00007FFC63EB0000-0x00007FFC63EC1000-memory.dmp

memory/6052-843-0x00007FFC63ED0000-0x00007FFC63F1D000-memory.dmp

memory/6052-842-0x00007FFC63F20000-0x00007FFC63F39000-memory.dmp

memory/6052-841-0x00007FFC63F40000-0x00007FFC63F56000-memory.dmp

memory/6052-839-0x00007FFC66B70000-0x00007FFC66C8C000-memory.dmp

memory/6052-838-0x00007FFC67150000-0x00007FFC67172000-memory.dmp

memory/6052-837-0x00007FFC67180000-0x00007FFC67194000-memory.dmp

memory/6052-836-0x00007FFC67940000-0x00007FFC67954000-memory.dmp

memory/6052-835-0x00007FFC67960000-0x00007FFC67972000-memory.dmp

memory/6052-833-0x00007FFC679C0000-0x00007FFC67A78000-memory.dmp

memory/6052-832-0x00007FFC66C90000-0x00007FFC67005000-memory.dmp

memory/6052-830-0x00007FFC67A80000-0x00007FFC67BF3000-memory.dmp

memory/6052-825-0x00007FFC680D0000-0x00007FFC680E9000-memory.dmp

memory/5708-814-0x00007FFC662A0000-0x00007FFC662BE000-memory.dmp

memory/5708-813-0x00007FFC67930000-0x00007FFC6793A000-memory.dmp

memory/5708-812-0x00007FFC662E0000-0x00007FFC662F1000-memory.dmp

memory/5708-811-0x00007FFC66300000-0x00007FFC6634D000-memory.dmp

memory/5708-810-0x00007FFC66350000-0x00007FFC66369000-memory.dmp

memory/5708-809-0x00007FFC66370000-0x00007FFC66386000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 008114e1a1a614b35e8a7515da0f3783
SHA1 3c390d38126c7328a8d7e4a72d5848ac9f96549b
SHA256 7301b76033c2970e61bab5eaddaff5aa652c39db5c0ea5632814f989716a1d18
SHA512 a202fc891eace003c346bad7e5d2c73dadf9591d5ce950395ff4b63cc2866b17e02bd3f0ad92749df033a936685851455bcdbfad30f26e765c3c89d3309cb82b

memory/5708-800-0x00007FFC680F0000-0x00007FFC68465000-memory.dmp

memory/5708-808-0x00007FFC679A0000-0x00007FFC679BB000-memory.dmp

memory/5708-807-0x00007FFC671A0000-0x00007FFC672BC000-memory.dmp

memory/5708-806-0x00007FFC67D90000-0x00007FFC67DB2000-memory.dmp

memory/5708-805-0x00007FFC67DC0000-0x00007FFC67DD4000-memory.dmp

memory/5708-804-0x00007FFC67DE0000-0x00007FFC67DF4000-memory.dmp

memory/5708-803-0x00007FFC67E30000-0x00007FFC67E42000-memory.dmp

memory/5708-802-0x00007FFC67E50000-0x00007FFC67E65000-memory.dmp

memory/5708-801-0x00007FFC67EF0000-0x00007FFC67FA8000-memory.dmp

memory/5708-799-0x00007FFC684A0000-0x00007FFC684CE000-memory.dmp

memory/5708-798-0x00007FFC684D0000-0x00007FFC68643000-memory.dmp

memory/5708-790-0x00007FFC68CF0000-0x00007FFC692D8000-memory.dmp

memory/5708-796-0x00007FFC68680000-0x00007FFC686AD000-memory.dmp

memory/5708-795-0x00007FFC686B0000-0x00007FFC686C9000-memory.dmp

memory/5708-580-0x00007FFC680F0000-0x00007FFC68465000-memory.dmp

memory/5824-586-0x00007FFC66A90000-0x00007FFC66AA9000-memory.dmp

memory/6140-585-0x00007FFC6BA20000-0x00007FFC6BA2F000-memory.dmp

memory/6140-584-0x00007FFC66AB0000-0x00007FFC66AD4000-memory.dmp

memory/5824-583-0x00007FFC6BD90000-0x00007FFC6BD9F000-memory.dmp

memory/6140-582-0x00007FFC65130000-0x00007FFC65718000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI55642\select.pyd

MD5 c39459806c712b3b3242f8376218c1e1
SHA1 85d254fb6cc5d6ed20a04026bff1158c8fd0a530
SHA256 7cbd4339285d145b422afa280cee685258bc659806be9cf8b334805bc45b29c9
SHA512 b727c6d1cd451d658e174161135d3be48d7efda21c775b8145bc527a54d6592bfc50919276c6498d2e2233ac1524c1699f59f0f467cc6e43e5b5e9558c87f49d

C:\Users\Admin\AppData\Local\Temp\_MEI55642\pyexpat.pyd

MD5 fe0e32bfe3764ed5321454e1a01c81ec
SHA1 7690690df0a73bdcc54f0f04b674fc8a9a8f45fb
SHA256 b399bff10812e9ea2c9800f74cb0e5002f9d9379baf1a3cef9d438caca35dc92
SHA512 d1777f9e684a9e4174e18651e6d921ae11757ecdbeb4ee678c6a28e0903a4b9ab9f6e1419670b4d428ee20f86c7d424177ed9daf4365cf2ee376fcd065c1c92d

C:\Users\Admin\AppData\Local\Temp\_MEI55642\propcache\_helpers_c.cp311-win_amd64.pyd

MD5 16d88c0afeecf94b78f1497b1072b0fe
SHA1 d710adfd375d7ffda0fa4986ba48a13708a7ca91
SHA256 a6d81bfe53de077332b82094d20b04d57efcaa0c58c7b6eb6240fd0626d35409
SHA512 fa6e392c7b9c1c8907b7646fac518e908d9bfbcc65ea3464f531ff5af39e3e8cfb314e3d13ed4041ffda692b364c2f7d5617aaf9867bbeeff1e08d286a5ae2ae

C:\Users\Admin\AppData\Local\Temp\_MEI55642\multidict\_multidict.cp311-win_amd64.pyd

MD5 5587c32d9bf7f76e1a9565df8b1b649f
SHA1 52ae204a65c15a09ecc73e7031e3ac5c3dcb71b2
SHA256 7075185db068e3c8f1b7db75e5aa5c500fc76ed8270c6abc6f49681d7119a782
SHA512 f21d0530389138457d6fdcdb3487a3c8b030338c569b2742f9e691e43af1d9e779c98426bad81b152f343b324a9375fe1322ef74030b1c8f8ba606d19e562e97

C:\Users\Admin\AppData\Local\Temp\_MEI55642\libssl-1_1.dll

MD5 6cd33578bc5629930329ca3303f0fae1
SHA1 f2f8e3248a72f98d27f0cfa0010e32175a18487f
SHA256 4150ee603ad2da7a6cb6a895cb5bd928e3a99af7e73c604de1fc224e0809fdb0
SHA512 c236a6ccc8577c85509d378c1ef014621cab6f6f4aa26796ff32d8eec8e98ded2e55d358a7d236594f7a48646dc2a6bf25b42a37aed549440d52873ebca4713e

C:\Users\Admin\AppData\Local\Temp\_MEI55642\frozenlist\_frozenlist.cp311-win_amd64.pyd

MD5 4958b93afcea376c56d67eb2d70645bc
SHA1 a5b31435c2925b585a14666cb23682bcba38a576
SHA256 bfeb41b7d1aeae29992a44dc992fd7c752b87b0f87d67cf452eba15e85341cbe
SHA512 be32abe68cef6c8e396de42f2b5adaff4373172b5b980e1bfff0944330f1bfad92b58cf00997f072da129522cd14b54d48b8a39dba1d3e0798ad863d7ba32a39

C:\Users\Admin\AppData\Local\Temp\_MEI55642\cryptography\hazmat\bindings\_rust.pyd

MD5 27bfdc1a00eb382f490991a6507cc3f2
SHA1 162bc0ddf111968bfd69246660cf650f89b5b7bc
SHA256 788d5c28a70e2bc4e695c827aec70e0869ad7bfdd1f0f4f75231d6f8d83450c2
SHA512 6fcc538c0f901f8543cf296b981a68eb6271f72ddcd106b69b45e0ebd166a355299ce23e999aa855d23edd69f95f53b653f92772435a42c72001386cdb423899

C:\Users\Admin\AppData\Local\Temp\_MEI55642\cryptography-43.0.3.dist-info\license_files\LICENSE.BSD

MD5 5ae30ba4123bc4f2fa49aa0b0dce887b
SHA1 ea5b412c09f3b29ba1d81a61b878c5c16ffe69d8
SHA256 602c4c7482de6479dd2e9793cda275e5e63d773dacd1eca689232ab7008fb4fb
SHA512 ddbb20c80adbc8f4118c10d3e116a5cd6536f72077c5916d87258e155be561b89eb45c6341a1e856ec308b49a4cb4dba1408eabd6a781fbe18d6c71c32b72c41

C:\Users\Admin\AppData\Local\Temp\_MEI55642\cryptography-43.0.3.dist-info\license_files\LICENSE.APACHE

MD5 4e168cce331e5c827d4c2b68a6200e1b
SHA1 de33ead2bee64352544ce0aa9e410c0c44fdf7d9
SHA256 aac73b3148f6d1d7111dbca32099f68d26c644c6813ae1e4f05f6579aa2663fe
SHA512 f451048e81a49fbfa11b49de16ff46c52a8e3042d1bcc3a50aaf7712b097bed9ae9aed9149c21476c2a1e12f1583d4810a6d36569e993fe1ad3879942e5b0d52

C:\Users\Admin\AppData\Local\Temp\_MEI55642\cryptography-43.0.3.dist-info\license_files\LICENSE

MD5 8c3617db4fb6fae01f1d253ab91511e4
SHA1 e442040c26cd76d1b946822caf29011a51f75d6d
SHA256 3e0c7c091a948b82533ba98fd7cbb40432d6f1a9acbf85f5922d2f99a93ae6bb
SHA512 77a1919e380730bcce5b55d76fbffba2f95874254fad955bd2fe1de7fc0e4e25b5fdaab0feffd6f230fa5dc895f593cf8bfedf8fdc113efbd8e22fadab0b8998

C:\Users\Admin\AppData\Local\Temp\_MEI55642\cryptography-43.0.3.dist-info\WHEEL

MD5 c869d30012a100adeb75860f3810c8c9
SHA1 42fd5cfa75566e8a9525e087a2018e8666ed22cb
SHA256 f3fe049eb2ef6e1cc7db6e181fc5b2a6807b1c59febe96f0affcc796bdd75012
SHA512 b29feaf6587601bbe0edad3df9a87bfc82bb2c13e91103699babd7e039f05558c0ac1ef7d904bcfaf85d791b96bc26fa9e39988dd83a1ce8ecca85029c5109f0

memory/6052-554-0x00007FFC67130000-0x00007FFC6714B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI55642\cryptography-43.0.3.dist-info\RECORD

MD5 01123b16f8b6a298539243e0b73ce434
SHA1 dbf71311e9540325b8d60fae25576fd1cca912ff
SHA256 887833e03f8f5805ca3f7c25223f6740e9e924369b30750424c7487977815933
SHA512 e70f1c8a129ee7184445410223ae132f313f7e47aabda5b5deeacfb29a0bea38a324d7e0fcfe071f00a945ab143af876a405de01b3796d3f337e735e100e5e46

C:\Users\Admin\AppData\Local\Temp\_MEI55642\cryptography-43.0.3.dist-info\METADATA

MD5 c891cd93024af027647e6de89d0ffce2
SHA1 01d8d6f93f1b922a91c82d4711bcefb885ad47b0
SHA256 eb36e0e4251e8479ef36964440755ef22bedd411ba87a93f726fa8e5bb0e64b0
SHA512 3386fbb3dcf7383b2d427093624c531c50be34e3e0aa0984547b953e04776d0d431d5267827f4194a9b0ad1ab897869115623e802a6a1c5d2ae1ad82c96cce71

memory/6052-540-0x00007FFC66B70000-0x00007FFC66C8C000-memory.dmp

memory/6052-538-0x00007FFC67180000-0x00007FFC67194000-memory.dmp

memory/6052-539-0x00007FFC67150000-0x00007FFC67172000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI55642\attrs-24.2.0.dist-info\licenses\LICENSE

MD5 5e55731824cf9205cfabeab9a0600887
SHA1 243e9dd038d3d68c67d42c0c4ba80622c2a56246
SHA256 882115c95dfc2af1eeb6714f8ec6d5cbcabf667caff8729f42420da63f714e9f
SHA512 21b242bf6dcbafa16336d77a40e69685d7e64a43cc30e13e484c72a93cd4496a7276e18137dc601b6a8c3c193cb775db89853ecc6d6eb2956deee36826d5ebfe

C:\Users\Admin\AppData\Local\Temp\_MEI55642\attrs-24.2.0.dist-info\WHEEL

MD5 52adfa0c417902ee8f0c3d1ca2372ac3
SHA1 b67635615eef7e869d74f4813b5dc576104825dd
SHA256 d7215d7625cc9af60aed0613aad44db57eba589d0ccfc3d8122114a0e514c516
SHA512 bfa87e7b0e76e544c2108ef40b9fac8c5ff4327ab8ede9feb2891bd5d38fea117bd9eebaf62f6c357b4deaddad5a5220e0b4a54078c8c2de34cb1dd5e00f2d62

C:\Users\Admin\AppData\Local\Temp\_MEI55642\attrs-24.2.0.dist-info\RECORD

MD5 8037e693eafed6c3d0cce916babb50c4
SHA1 2321392aab7ae3a6a78248e5d5f454124d368ec1
SHA256 688073f6556808d9139fea52bec3802d8c0d7ce07978b98aae8db5c98facc0df
SHA512 95b9e6b8f946d2617098c338441afc5a555ff208947d5731e09ee17b959655161c397f57e14827a95a8fd4554de8c6e426dc316f858510ae4aa7ca8723c4cf51

C:\Users\Admin\AppData\Local\Temp\_MEI55642\attrs-24.2.0.dist-info\METADATA

MD5 49cabcb5f8da14c72c8c3d00adb3c115
SHA1 f575becf993ecdf9c6e43190c1cb74d3556cf912
SHA256 dc9824e25afd635480a8073038b3cdfe6a56d3073a54e1a6fb21edd4bb0f207c
SHA512 923daeee0861611d230df263577b3c382ae26400ca5f1830ee309bd6737eed2ad934010d61cdd4796618bedb3436cd772d9429a5bed0a106ef7de60e114e505c

C:\Users\Admin\AppData\Local\Temp\_MEI55642\aiohttp\_websocket.cp311-win_amd64.pyd

MD5 86a658eb19727b88129c283fd6fcc33c
SHA1 e64da6c74518e96186a428d5f19e376710a7f7a4
SHA256 1c331eba1fb262ae878124456291c38a7bf342c1bec107e06fdc7a704f6ce937
SHA512 ee23ef0dd8fb9ca02d16923da2b0d2175975322afdf35274f7fb8350baa6c8ec044d24f371ad147336e8948a19e10a93b8b8edc8ca2f6f99e330e502e7200c95

C:\Users\Admin\AppData\Local\Temp\_MEI55642\aiohttp\_http_writer.cp311-win_amd64.pyd

MD5 69c4149247d7fb6958a1a38efdcedc63
SHA1 d530e7da9910bca8b78a5fd1fc1dffc0e8bf5752
SHA256 ecae08a8ed98388a987bc36ad231e4e63d21e9ccb59376bc46cc22ea769f5e99
SHA512 2678d369a83a786b6adcacf3beebce723b9c7cf81823fd6a5e6931773b1b1b0c2b56f7a0f2c80ac2b96d38fa7496049a584f81a61260ae97095abf1ce98dff29

C:\Users\Admin\AppData\Local\Temp\_MEI55642\aiohttp\_http_parser.cp311-win_amd64.pyd

MD5 c2020c40f438f0cc39b2017758a1b7b4
SHA1 4ebe220f1b72c9daec854bbeda64396f462742d7
SHA256 7374dd42a06745a6e293c55c8cfce56aaeb380a8209913ec48c5a691f2593a75
SHA512 d5eb7499270b192f34981386ab2cca8161c18565474f44aec34c0aeb67c489bf65dfed3fa2ae27e631f523c305c9b5ed8c1fe030f5045a25a7fb1174e7597900

C:\Users\Admin\AppData\Local\Temp\_MEI55642\aiohttp\_helpers.cp311-win_amd64.pyd

MD5 6329786659cdb8b94266f7f602e093ca
SHA1 26b3462eef66b2b447b7f25aa731e0d8b0ef6d0b
SHA256 219f86dcf68ee6e197eaa004db824db672bfd7a4334b48c916b4ec05f6ebcf4d
SHA512 aa62673e136b896edc2fcd1bc39f066ae2443e760a68797e60487dbd5625b3a54b2ed3f2982b2cd601f3a24ca29ac090304c488df2df105241a7da3973bdc2ca

C:\Users\Admin\AppData\Local\Temp\_MEI55642\_ssl.pyd

MD5 fd0f4aed22736098dc146936cbf0ad1d
SHA1 e520def83b8efdbca9dd4b384a15880b036ee0cf
SHA256 50404a6a3de89497e9a1a03ff3df65c6028125586dced1a006d2abb9009a9892
SHA512 c8f3c04d87da19041f28e1d474c8eb052fe8c03ffd88f0681ef4a2ffe29755cfd5b9c100a1b1d2fdb233cb0f70e367af500cbd3cd4ce77475f441f2b2aa0ab8a

C:\Users\Admin\AppData\Local\Temp\_MEI55642\_sqlite3.pyd

MD5 d9eeeeacc3a586cf2dbf6df366f6029e
SHA1 4ff9fb2842a13e9371ce7894ec4fe331b6af9219
SHA256 67649e1e8acd348834efb2c927ab6a7599cf76b2c0c0a50b137b3be89c482e29
SHA512 0b9f1d80fb92c796682dba94a75fbce0e4fbeaedccd50e21d42d4b9366463a830109a8cd4300aa62b41910655f8ca96ecc609ea8a1b84236250b6fd08c965830

C:\Users\Admin\AppData\Local\Temp\_MEI55642\_socket.pyd

MD5 04e7eb0b6861495233247ac5bb33a89a
SHA1 c4d43474e0b378a00845cca044f68e224455612a
SHA256 7efe25284a4663df9458603bf0988b0f47c7dcf56119e3e853e6bda80831a383
SHA512 d4ea0484363edf284ac08a1c3356cc3112d410dd80fe5010c1777acf88dbd830e9f668b593e252033d657a3431a79f7b68d09eb071d0c2ceb51632dbe9b8ed97

C:\Users\Admin\AppData\Local\Temp\_MEI55642\_queue.pyd

MD5 0614691624f99748ef1d971419bdb80d
SHA1 39c52450ed7e31e935b5b0e49d03330f2057747d
SHA256 ac7972502144e9e01e53001e8eec3fc9ab063564678b784d024da2036ba7384d
SHA512 184bc172c7bb8a1fb55c4c23950cbe5e0b5a3c96c1c555ed8476edf79c5c729ed297112ee01b45d771e5c0055d2dc402b566967d1900b5abf683ee8e668c5b26

C:\Users\Admin\AppData\Local\Temp\_MEI55642\_overlapped.pyd

MD5 97a40f53a81c39469cc7c8dd00f51b5d
SHA1 6c3916fe42e7977d8a6b53bfbc5a579abcf22a83
SHA256 11879a429c996fee8be891af2bec7d00f966593f1e01ca0a60bd2005feb4176f
SHA512 02af654ab73b6c8bf15a81c0e9071c8faf064c529b1439a2ab476e1026c860cf7d01472945112d4583e5da8e4c57f1df2700331440be80066dbb6a7e89e1c5af

C:\Users\Admin\AppData\Local\Temp\_MEI55642\_multiprocessing.pyd

MD5 849b4203c5f9092db9022732d8247c97
SHA1 ed7bd0d6dcdcfa07f754b98acf44a7cfe5dcb353
SHA256 45bfbab1d2373cf7a8af19e5887579b8a306b3ad0c4f57e8f666339177f1f807
SHA512 cc618b4fc918b423e5dbdcbc45206653133df16bf2125fd53bafef8f7850d2403564cf80f8a5d4abb4a8928ff1262f80f23c633ea109a18556d1871aff81cd39

C:\Users\Admin\AppData\Local\Temp\_MEI55642\_lzma.pyd

MD5 bfca96ed7647b31dd2919bedebb856b8
SHA1 7d802d5788784f8b6bfbb8be491c1f06600737ac
SHA256 032b1a139adcff84426b6e156f9987b501ad42ecfb18170b10fb54da0157392e
SHA512 3a2926b79c90c3153c88046d316a081c8ddfb181d5f7c849ea6ae55cb13c6adba3a0434f800c4a30017d2fbab79d459432a2e88487914b54a897c4301c778551

C:\Users\Admin\AppData\Local\Temp\_MEI55642\_decimal.pyd

MD5 e9501519a447b13dcca19e09140c9e84
SHA1 472b1aa072454d065dfe415a05036ffd8804c181
SHA256 6b5fe2dea13b84e40b0278d1702aa29e9e2091f9dc09b64bbff5fd419a604c3c
SHA512 ef481e0e4f9b277642652cd090634e1c04702df789e2267a87205e0fe12b00f1de6cdd4fafb51da01efa726606c0b57fcb2ea373533c772983fc4777dc0acc63

C:\Users\Admin\AppData\Local\Temp\_MEI55642\_ctypes.pyd

MD5 b4c41a4a46e1d08206c109ce547480c7
SHA1 9588387007a49ec2304160f27376aedca5bc854d
SHA256 9925ab71a4d74ce0ccc036034d422782395dd496472bd2d7b6d617f4d6ddc1f9
SHA512 30debb8e766b430a57f3f6649eeb04eb0aad75ab50423252585db7e28a974d629eb81844a05f5cb94c1702308d3feda7a7a99cb37458e2acb8e87efc486a1d33

C:\Users\Admin\AppData\Local\Temp\_MEI55642\_cffi_backend.cp311-win_amd64.pyd

MD5 0f0f1c4e1d043f212b00473a81c012a3
SHA1 ff9ff3c257dceefc74551e4e2bacde0faaef5aec
SHA256 fda255664cbf627cb6a9cd327daf4e3eb06f4f0707ed2615e86e2e99b422ad0b
SHA512 fcfa42f417e319bddf721f298587d1b26e6974e5d7589dfe6ddd2b013bc554a53db3725741fbc4941f34079ed8cb96f05934f3c2b933cda6a7e19cda315591a7

memory/5708-516-0x00007FFC6A620000-0x00007FFC6A639000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI55642\_bz2.pyd

MD5 80c69a1d87f0c82d6c4268e5a8213b78
SHA1 bae059da91d48eaac4f1bb45ca6feee2c89a2c06
SHA256 307359f1b2552b60839385eb63d74cbfe75cd5efdb4e7cd0bb7d296fa67d8a87
SHA512 542cf4ba19dd6a91690340779873e0cb8864b28159f55917f98a192ff9c449aba2d617e9b2b3932ddfeee13021706577ab164e5394e0513fe4087af6bc39d40d

memory/6052-497-0x00007FFC67940000-0x00007FFC67954000-memory.dmp

memory/6052-495-0x00007FFC67960000-0x00007FFC67972000-memory.dmp

memory/6052-478-0x00007FFC67980000-0x00007FFC67995000-memory.dmp

memory/5708-477-0x00007FFC68CF0000-0x00007FFC692D8000-memory.dmp

memory/5708-476-0x00007FFC67E50000-0x00007FFC67E65000-memory.dmp

memory/5868-475-0x00007FFC6A660000-0x00007FFC6A697000-memory.dmp

memory/5708-474-0x00007FFC679A0000-0x00007FFC679BB000-memory.dmp

memory/5708-472-0x00007FFC67D90000-0x00007FFC67DB2000-memory.dmp

memory/5708-471-0x00007FFC67DC0000-0x00007FFC67DD4000-memory.dmp

memory/5708-470-0x00007FFC67DE0000-0x00007FFC67DF4000-memory.dmp

memory/6052-469-0x00007FFC679C0000-0x00007FFC67A78000-memory.dmp

memory/6052-468-0x00007FFC66C90000-0x00007FFC67005000-memory.dmp

memory/5708-466-0x00007FFC67E30000-0x00007FFC67E42000-memory.dmp

memory/6052-465-0x00007FFC67A80000-0x00007FFC67BF3000-memory.dmp

memory/6052-464-0x00007FFC680D0000-0x00007FFC680E9000-memory.dmp

memory/6052-463-0x00007FFC68700000-0x00007FFC68CE8000-memory.dmp

memory/6052-461-0x00007FFC67E70000-0x00007FFC67E93000-memory.dmp

memory/6052-460-0x00007FFC67EA0000-0x00007FFC67ECD000-memory.dmp

memory/6052-459-0x00007FFC67ED0000-0x00007FFC67EE9000-memory.dmp

memory/6052-458-0x00007FFC6CEC0000-0x00007FFC6CECD000-memory.dmp

memory/6052-457-0x00007FFC6EE70000-0x00007FFC6EE7F000-memory.dmp

memory/5708-456-0x00007FFC67EF0000-0x00007FFC67FA8000-memory.dmp

memory/5708-455-0x00007FFC680F0000-0x00007FFC68465000-memory.dmp

memory/6052-454-0x00007FFC68470000-0x00007FFC68494000-memory.dmp

memory/5868-453-0x00007FFC692E0000-0x00007FFC69A6A000-memory.dmp

memory/5708-447-0x00007FFC6A620000-0x00007FFC6A639000-memory.dmp

memory/5868-446-0x00007FFC6A700000-0x00007FFC6A74D000-memory.dmp

memory/5868-444-0x00007FFC6A770000-0x00007FFC6A786000-memory.dmp

memory/5708-443-0x00007FFC75220000-0x00007FFC7522F000-memory.dmp

memory/6052-442-0x00007FFC68700000-0x00007FFC68CE8000-memory.dmp

memory/5868-392-0x00007FFC6A8D0000-0x00007FFC6A8F2000-memory.dmp

memory/5868-327-0x00007FFC6A660000-0x00007FFC6A697000-memory.dmp

memory/5868-318-0x00007FFC6A700000-0x00007FFC6A74D000-memory.dmp

memory/5868-317-0x00007FFC69EB0000-0x00007FFC6A023000-memory.dmp

memory/5868-316-0x00007FFC6AC10000-0x00007FFC6AC33000-memory.dmp

memory/5868-314-0x00007FFC6A770000-0x00007FFC6A786000-memory.dmp

memory/5868-313-0x00007FFC6ADC0000-0x00007FFC6ADD9000-memory.dmp

memory/5868-311-0x00007FFC6A7B0000-0x00007FFC6A8CC000-memory.dmp

memory/5868-309-0x00007FFC6ADE0000-0x00007FFC6AE04000-memory.dmp

memory/5868-307-0x00007FFC6ABC0000-0x00007FFC6ABD5000-memory.dmp

memory/5868-306-0x00007FFC6A960000-0x00007FFC6A974000-memory.dmp

memory/5868-305-0x00007FFC6A980000-0x00007FFC6A994000-memory.dmp

memory/5868-304-0x00007FFC6ABA0000-0x00007FFC6ABB2000-memory.dmp

memory/5868-302-0x00007FFC69A70000-0x00007FFC69DE5000-memory.dmp

memory/5868-297-0x00000170714B0000-0x0000017071825000-memory.dmp

memory/5868-295-0x00007FFC6A030000-0x00007FFC6A618000-memory.dmp

memory/5868-291-0x00007FFC6ABE0000-0x00007FFC6AC0E000-memory.dmp

memory/5868-287-0x00007FFC6AC10000-0x00007FFC6AC33000-memory.dmp

memory/5868-284-0x00007FFC7D740000-0x00007FFC7D74D000-memory.dmp

memory/5868-282-0x00007FFC6ADA0000-0x00007FFC6ADB9000-memory.dmp

memory/5868-281-0x00007FFC6ADC0000-0x00007FFC6ADD9000-memory.dmp

memory/5868-256-0x00007FFC6ADE0000-0x00007FFC6AE04000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u10yit1l.13v.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Desktop\BackupAssert.odt

MD5 818f4706857325f03a38f983bfb7761d
SHA1 579620e058fb4c736d3fcc49971d420e148380e7
SHA256 c6804257d01d63ba19b28011432266cc7fbe9b92005f797cd56f436834ed0303
SHA512 11402033889074d276959dd7bef1ab81255b7fa5b7866aa436238d759e7a02c8318dc712435e03dbfd29522d1b9445bda20203d816e3340d3ec55765d7fad056

C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Desktop\WriteClear.zip

MD5 479ce4d08c8760bf80844f7e6b91f3b8
SHA1 2ba5b3417d6c26d0821c67442f7b4d83eadc2944
SHA256 2cf05e5971eb86915a234f72730a83ddf0cb38e44cf612d44f4c19a5b0160f03
SHA512 ad1ac661fa4bee1b36eeba5d50cdad374b9729bb84fbf4357f602a992edcf56394e6b361d02ae1d09e606486b41e7dd53d1640507782218c06d9e2d6ee4bd6fe

C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Desktop\ResolveAdd.docx

MD5 649e0449bceb53c1720a1230fdb59fc2
SHA1 50b38440b4c0bcfd242a52f3c71317fd559df0ff
SHA256 24361de3654a2ddb39d042f958815e2637f82a2cbc39b3d3d333cdc4f645576c
SHA512 4a56975e2efe7244d362f2df220c394b1ef5847c6e26050336de6f81bd64a5efed59524a10bdfef5fa2b6cf93f723ac4ccda0984d432ca8678ed0647057edf68

C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Desktop\RepairBackup.mp2v

MD5 ec6ada278b4b0449bfe3080ab43ba999
SHA1 ae9856ba3c9b68ce984bf8ba0ec56a53511b2aaa
SHA256 f18e16022937d50f19c2e748d660e67f0efaedd177b898e1c9a073201f957d6a
SHA512 7115de8211881962ac475ecbe34f60bd5f0652eb0e1084443dadec8a04da94719408a4b77fcac2ab8e4554697a86512ca7f82f3e0cceae4b19b87fcb9fb0f48b

C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Documents\ConfirmDebug.xlsx

MD5 72adc3bdde588a3a8cb316066c8f01ba
SHA1 27ebb1883da50050d6871e9b0a0f90680311793e
SHA256 084ca8e5771657d22c1e26a611f44bb07b6308a238b94bc29014258f6f2929c0
SHA512 3a6aac40a28b4d5ee01d8edd9f9281711f2b7f23d0f82a4c077356173b7dac5f7cdde2d5208841331f89a1dd06a0026677d74237f29d902e5e9d756ed475f406

C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Documents\CompleteImport.xlsx

MD5 7f884a65ae1c98dacffb62516b221117
SHA1 f53df2c9906f3620faad36a773fad0b577c8e415
SHA256 144527eb6924ddd0e51326f725790f1066be1ac3c9e1d6eaf890c9d93675614c
SHA512 29bf6caca836beb17c83b24721afea2c36eb861a05bc0d3b9ff835ab9d204b2fdf323018faf7911f14b86bb754547547faf7441aafc9ea12fc7348de4c15125b

C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Documents\WatchRedo.csv

MD5 cf3b63666813c19b3cc005ef0fe60289
SHA1 226329c6857f6b88df2b83b545bec761cb538a4e
SHA256 633bc6480cbe5841893d82f5505383facf1a4eb5a847b43a0c8a26a8980b962b
SHA512 96b97fd9be54434fe5f0f6971f884538186481a8c81454f515170d638aebd7332f6b3365ce3844742346ce57b6adc0d67deae59c15661aabc272597746b3ece5

C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Documents\SearchCompare.docx

MD5 b4e7691b4608d7db74746cd6425371da
SHA1 4f07dcbbbf0a2c81796f5e304da2145b0ff2ba73
SHA256 a63c1345bba42e13672a33a6f16a752b4308186aabeaa866b5745fb55bc9abc4
SHA512 7edc978e3bfa9b09d6e693533a0610c7428f55fc7ad7dabf9950e577be71b4223f29e58048989d96a681786aeecb1d04d38b318f8a7b855d3d0fd394f9dd8272

C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Downloads\CloseLimit.mp3

MD5 3ab19ac3e91ae6bebfee5a67ab16d13a
SHA1 55dc570c5603ed0b5894d2d556333a5c9e602cf0
SHA256 bdce008831b9f0027c96b22aca3359399077ad2c1dc095a5722f8176688020b6
SHA512 009966378cebb39b4b2e8c90f97c2baa299e6b90c91dcd69402ffda3d1ee5a87c54f30aa2ff2a63f989db38bc81fa0ce3d89daa444eb59ab792b67a1d55295fd

C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Downloads\PushStep.jpg

MD5 96e4c00ac31f8d2864cc7f3230b3dbc4
SHA1 26c3a9dce8947fd371ad606d09341763609e4a0d
SHA256 7ff69c8cf3e73d118d8029e7bdb3ffa112ea9979efd626654b19b499c5fe5ff2
SHA512 e067a44cf53a8c74bff480ee39894e7539be74d5011cee122111455cfe148221e7568d09f12467d6c787812592c29edcc4edf9ffc80940464b55276b44a82578

C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Downloads\ReadPing.zip

MD5 a7598844a4ecf8dac4390a8d9bfc8b24
SHA1 fe1265b5df36d9114e38ef4e4ff3644ccf707fba
SHA256 edb3f7286482fd248cee7927edcaa04271f1e3f69ad5c6ac07e721b798e9451d
SHA512 1b7c28f975536a677735a6ce0712cb6f177210fd15f3e38b0f3263ab59a8b0efa6abc26bb73614af0a949220092e441cfd7e71cc998eaef8958dd746f0e8341a

C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Downloads\RegisterLock.mp3

MD5 0fdc61fc43a3e329195bb06bc9496840
SHA1 867ae4c6eb0b7c0641ecf6ad10d98ee7d44ab456
SHA256 74bda739de2e5c22cfa58ddc740693b20b07575a096d6263e1febc065076ca29
SHA512 cf3d9f9502ac89bcefb122b8cd4c23f02ccb667e019d90bbe662e5513b0e4319c9304449a5f5bce849571f0434fa54b780f59fa5d916649b9fdaed90ce1a80c8

C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Music\RemoveBackup.sql

MD5 ac18db499ee3138608f04f20667b49ca
SHA1 0b7e28bd2b0afa2ae186a6dc57aee7c9fc0c14e3
SHA256 bbabe9f57fc9d7136e6c578fbd6b7bb3d3e99e05cb189fcccc705bf9eab40d4c
SHA512 57f351cdc4ff09d555f48bfba3542cdeb9f7d1a4fa9ab8d723ffc7c363a07a5b55e53addbf4148e125a025866d2fadfb2996afd46099ae38743a9aebf55c583b

C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Pictures\BlockSuspend.jpg

MD5 c0a7639f1412186c5e7808ae285f0361
SHA1 95517e8822dd6e46c79ed2ea48416f99101d7e92
SHA256 1a4f3bd938bd2c01989602afb6a86efadf607933c4d238c8ec8408d7a343ff75
SHA512 5ed8604d24efceaf254e15d3482592080a0a396dc970e7f5e2a29369d032c433d91bac1c9e17a20cbe516052aeed2f110205fb512816452b682916f08138a3b4

C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Pictures\DisablePing.jpeg

MD5 3b50090219c03e36ef03c63f81f08aa0
SHA1 22403f9466e6efa5bcff320c3c63849ff32128b5
SHA256 0d4d2627221cc41309f9dccde55a2039e5230e94611d8a33870e027e49cf4cf5
SHA512 c369a9566f0fac740959043126565f73e4db68fbd0d56902bba198fe17d20cede24b378c901ddbc231d03363f80c5bcc3831970de6148a1efdafd8300300ab28

C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Pictures\My Wallpaper.jpg

MD5 a51464e41d75b2aa2b00ca31ea2ce7eb
SHA1 5b94362ac6a23c5aba706e8bfd11a5d8bab6097d
SHA256 16d5506b6663085b1acd80644ffa5363c158e390da67ed31298b85ddf0ad353f
SHA512 b2a09d52c211e7100e3e68d88c13394c64f23bf2ec3ca25b109ffb1e1a96a054f0e0d25d2f2a0c2145616eabc88c51d63023cef5faa7b49129d020f67ab0b1ff

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

MD5 e301f325812504e82dee42732748b70c
SHA1 97bc6afd4b84d8f6c661ac1f495a719a8dbd4cc7
SHA256 185e00c187f54d969c83054333ece92d4b1878575d129d993ef4a86e52150e46
SHA512 65132ea434a36d70eb1d2f70594761fe78f76106afcfe8749e7ccf2d99b0a53e3e863cba8524cb26fbb837ead6c22d79b8b457c6a73a4b775c2d6fc3371f5301

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 6312e65978b822e4ec8b2c3dc7849f23
SHA1 f73ee2c520d2fe7336172e3da94361911050acb6
SHA256 6f7422c5ae1455a60d2b1534b81fee2ef53528ea019cbbd04978d472d30fde14
SHA512 92e8b6a3960aa175955aa2f2c98c21e3da14cf0a1835b8e5e4afd247f991e0938be12deb7e1c67addb65f9e7d450c3ddc4af8d91183275f6c6f53c843ce6a805

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 bb94c1351886b91a5782a7a1665fc6c5
SHA1 f880abec9aba50195d2880ca6e2aa4ecbaf2a39e
SHA256 09dbae536ce841361bd34ce881ab946af22324fda0799f9c91c3593c8070482d
SHA512 1970af107924e7a112d5daebb80098b3f5a43ff9ecdd080a77004e29014e079981936f1cb5e0259d7018754ee1952aeb849b0521584bda87cb678d6d56dba4cb

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 690f8a40a2cac49399d6e5b867bea65d
SHA1 2f5d832fe31572468c81aea1cd92c4410f8d79f5
SHA256 4ae5b702c1a36f0ab75afdb4275daa7398a1f423b161a8a53c5a69a51703b255
SHA512 736130d1b97a9a189dfa5078ad2d0cfd90d74371276bd0f97ed4e0eaceb7e957177756c8c4d4adde605e3d4555081c9fc11f9d20359d168b92a0a04fe968b7c8

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 56c0f24e93dd4c9d9795be4fcfb0f259
SHA1 f1c2588c720ae9bdfbb2570899935b6b9aa85564
SHA256 901b1c043894fd7a3e26612e4ef439d1e324d2c615bfb3817f065bf96a0c11ed
SHA512 8feaef2000a43a259dffa97c5f126063d889cf01de892f2b44c0c9d963ac1a221572752bf4dd3aa1542fc2ada6b9b2e46340c23b787e795d709f517413212dda

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 33c736647b3355b11b34afecd49f910c
SHA1 058f992b47e7c5f3fbd25a836383ad87e18dec16
SHA256 e848f313b7a712d2c6143ed59f93ca03f753c5dc7252feb7b63de991dc75029e
SHA512 40dfd354ecb2165f22655cb7230e58f0c0f0c8343368c1af8d91690d6e68e01b9c1fe255a493ed2291b41831117777914370ad4ad40c983b5fb1e5f8a88e1594

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 f7efc6992499d246d2a5aeec7fd72d0d
SHA1 7f5cfb0fdf9a6842002fd99c180fd89037f6909c
SHA256 49878b6da135f7e56923f9df275b0caa9b90dc8af6118137db403f416103bcca
SHA512 aeb70df17783d3a5bdbae1cc479f36b9059534cf5ede571fea614bcea832a984b417af065e60e3d886dcf16a2c593acc148d259a08dd5750df2a8046b6d1c2ce

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c1cb8112-167b-4d39-ad38-051271ed3c54.tmp

MD5 5058f1af8388633f609cadb75a75dc9d
SHA1 3a52ce780950d4d969792a2559cd519d7ee8c727
SHA256 cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA512 0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 cb42c0d3bddf3aac44fd46a10df8b3cf
SHA1 d40069a50ca228eb7dd3775f771b315de66bee9b
SHA256 966c98b4aa83ee6d63e9af5bd17be7f60eec83c12bd91911e7a9eacfbf2ef3d2
SHA512 bdd5f2157933eba25f872ede46d4a552466c86c1155558555f17c015a32921169f50af78c6d492b26b826124ed905e35479d34404f7d199075ac6139f8e5ddc8

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\b0f23cab-238b-4d65-af43-f01e8f0d6163.tmp

MD5 9d25639d79ec6c855f153777aec62ce6
SHA1 0acd6fd00e819cbd72eacafa29b487a91acbea5f
SHA256 601eaf22aafa4538d47e62ee6b33ac21d55408f447941db8cdf31bb8e9663256
SHA512 ec4414149d8563126d7d67f4f4ff1de921cbdf32b92eac010b82dac2890faad5c8ff4e35d79fa3b33c4e7f305966a33e3dac21798e00571e7b8cfe4fe20e99f0

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 aefd77f47fb84fae5ea194496b44c67a
SHA1 dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA256 4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512 b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 99f6a49dfb0833c4f6aa82f266f5939b
SHA1 b77f04dc663752aa81fff3f764ff89b224beaabb
SHA256 82c5200e904e88ccc5017fad4fa8aded52961561b3de4391b0deae9fa2a88ab7
SHA512 6f56c69d43bef2944752fb2555024a285afb266869fe96f1ea26157f3f71e47ffa05662501a6c2e624f5a53be4452f333d4c8464e170cda4ab76e1bc80d7ab70

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 6460b4ac5ce310132034130333a5cf9f
SHA1 69567cdafe3191f725bc6af696feddc8cf136cc4
SHA256 72bf434f581232ccb121c34f164f8a4cc4becf0f1de618674b2422dbf6415ac9
SHA512 a063e8a2c07b1443842116840443547e1a213887cc903a3796eeefd3609cad1c2d4e4aa024663dbd2c2d54bbb743073ca794d616b583a364003290d693547304

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 c631d05f13c6ad4686855475344a9597
SHA1 f976d4da2ef03dc6f2aa3957d4ddb4f32fbb49df
SHA256 d143a8afca6552316c252fe6793d21d1313ea927725e0bcfe3f670f69a4caff8
SHA512 e56eab4d56aa68634bb919af2be6f796b335159e60effa7369e88dd86890b3d7fd180a7a25c7d65bba3e7b8531406e1b4a8ed4d427757033f1352b854729aa25

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 a4977f116441c67dba17eba82b7f32dd
SHA1 092131918bc2a2fe065d2071ac7ccfa17a953355
SHA256 d127f1cd1019520e8b1194600181c52982726e1701b612a08bb77719208826d7
SHA512 dea71e5d8ad5bd665162fe31febfe6ad9eb28e395255d52f5d847b03124a1870d3d7ec300efc22acd7286c902ee7916eb18d23f9bb73a29cf1d5e3ff003d7a1f

C:\Users\Admin\AppData\Local\Temp\Web.db

MD5 f70aa3fa04f0536280f872ad17973c3d
SHA1 50a7b889329a92de1b272d0ecf5fce87395d3123
SHA256 8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA512 30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84

C:\Users\Admin\AppData\Local\Temp\Web.db

MD5 f1b0d67d9700b657fffb1e53c14444ae
SHA1 ae8a3a681da72d78263510a2e6a2ad5a66cb0164
SHA256 7a26e63a529f6c2ceb6063b72e61caae2a643152c7b1b75b3396a700aac95bc1
SHA512 a2b3ab1807a517b1b499df7d8cbd7b695918113f4124b60ab54b6fa1b2fee6d0813c73202ceec42c7b9fc2c124e0555ecff62acb948cf0ddc19b51607f527b50

C:\Users\Admin\AppData\Local\Temp\HistoryData.db

MD5 f310cf1ff562ae14449e0167a3e1fe46
SHA1 85c58afa9049467031c6c2b17f5c12ca73bb2788
SHA256 e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855
SHA512 1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad