Analysis Overview
Threat Level: Known bad
The file https://mega.nz/file/4nlwxAqL#SRB6SE9FtsJVXmVM_OuUWGUL2GJM7t2fe08Ym2dbty8 was found to be: Known bad.
Malicious Activity Summary
Exela Stealer
Exelastealer family
Grants admin privileges
Modifies Windows Firewall
Loads dropped DLL
Executes dropped EXE
Reads user/profile data of web browsers
Clipboard Data
Network Service Discovery
Looks up external IP address via web service
Legitimate hosting services abused for malware hosting/C2
Hide Artifacts: Hidden Files and Directories
UPX packed file
Enumerates processes with tasklist
Launches sc.exe
Permission Groups Discovery: Local Groups
Event Triggered Execution: Netsh Helper DLL
System Network Configuration Discovery: Wi-Fi Discovery
System Network Connections Discovery
Browser Information Discovery
Detects Pyinstaller
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Views/modifies file attributes
Suspicious use of WriteProcessMemory
Suspicious behavior: EnumeratesProcesses
Runs net.exe
NTFS ADS
Enumerates system info in registry
Suspicious use of AdjustPrivilegeToken
Kills process with taskkill
Suspicious use of FindShellTrayWindow
Gathers system information
Modifies data under HKEY_USERS
Collects information from the system
Gathers network information
Suspicious use of SendNotifyMessage
MITRE ATT&CK
Analysis: static1
Detonation Overview
Reported
2024-11-03 22:12
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-03 22:12
Reported
2024-11-03 22:15
Platform
win10v2004-20241007-en
Max time kernel
139s
Max time network
149s
Command Line
Signatures
Exela Stealer
Exelastealer family
Grants admin privileges
Modifies Windows Firewall
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\netsh.exe | N/A |
| N/A | N/A | C:\Windows\system32\netsh.exe | N/A |
| N/A | N/A | C:\Windows\system32\netsh.exe | N/A |
| N/A | N/A | C:\Windows\system32\netsh.exe | N/A |
Clipboard Data
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\cmd.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\system32\cmd.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\Downloads\Tools.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\Tools.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\Tools.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\Tools.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\Tools.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\Tools.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\Tools.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\Tools.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\Tools.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\Tools.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\Tools.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\Tools.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\Tools.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\Tools.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\Tools.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\Tools.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\Tools.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\Tools.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\Tools.exe | N/A |
| N/A | N/A | C:\Users\Admin\Downloads\Tools.exe | N/A |
Loads dropped DLL
Reads user/profile data of web browsers
Legitimate hosting services abused for malware hosting/C2
| Description | Indicator | Process | Target |
| N/A | discord.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
| N/A | discord.com | N/A | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | ip-api.com | N/A | N/A |
Network Service Discovery
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\ARP.EXE | N/A |
| N/A | N/A | C:\Windows\system32\cmd.exe | N/A |
| N/A | N/A | C:\Windows\system32\ARP.EXE | N/A |
| N/A | N/A | C:\Windows\system32\cmd.exe | N/A |
Enumerates processes with tasklist
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
| N/A | N/A | C:\Windows\system32\tasklist.exe | N/A |
Hide Artifacts: Hidden Files and Directories
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\cmd.exe | N/A |
UPX packed file
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Launches sc.exe
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\sc.exe | N/A |
| N/A | N/A | C:\Windows\system32\sc.exe | N/A |
Browser Information Discovery
Detects Pyinstaller
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Event Triggered Execution: Netsh Helper DLL
| Description | Indicator | Process | Target |
| Key value enumerated | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key value enumerated | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key value enumerated | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key value enumerated | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key queried | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key value enumerated | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key value enumerated | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh | C:\Windows\system32\netsh.exe | N/A |
Permission Groups Discovery: Local Groups
System Network Configuration Discovery: Wi-Fi Discovery
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\netsh.exe | N/A |
| N/A | N/A | C:\Windows\system32\cmd.exe | N/A |
| N/A | N/A | C:\Windows\system32\netsh.exe | N/A |
| N/A | N/A | C:\Windows\system32\cmd.exe | N/A |
System Network Connections Discovery
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\NETSTAT.EXE | N/A |
| N/A | N/A | C:\Windows\system32\NETSTAT.EXE | N/A |
Collects information from the system
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| N/A | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Gathers network information
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\NETSTAT.EXE | N/A |
| N/A | N/A | C:\Windows\system32\ipconfig.exe | N/A |
| N/A | N/A | C:\Windows\system32\NETSTAT.EXE | N/A |
| N/A | N/A | C:\Windows\system32\ipconfig.exe | N/A |
Gathers system information
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\systeminfo.exe | N/A |
| N/A | N/A | C:\Windows\system32\systeminfo.exe | N/A |
Kills process with taskkill
Modifies data under HKEY_USERS
| Description | Indicator | Process | Target |
| Set value (int) | \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133751456556276364" | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry | C:\Program Files\Google\Chrome\Application\chrome.exe | N/A |
NTFS ADS
| Description | Indicator | Process | Target |
| File opened for modification | C:\Users\Admin\Downloads\Unconfirmed 155876.crdownload:SmartScreen | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Runs net.exe
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: 33 | N/A | C:\Windows\system32\AUDIODG.EXE | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\system32\AUDIODG.EXE | N/A |
| Token: SeIncreaseQuotaPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeSecurityPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeLoadDriverPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeSystemProfilePrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeSystemtimePrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeProfSingleProcessPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeRestorePrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeSystemEnvironmentPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeRemoteShutdownPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeUndockPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeManageVolumePrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: 33 | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: 34 | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: 35 | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: 36 | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\system32\tasklist.exe | N/A |
| Token: SeIncreaseQuotaPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeSecurityPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeLoadDriverPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeSystemProfilePrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeSystemtimePrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeProfSingleProcessPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeBackupPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeRestorePrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeSystemEnvironmentPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeRemoteShutdownPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeUndockPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeManageVolumePrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: 33 | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: 34 | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: 35 | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: 36 | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\system32\tasklist.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\system32\taskkill.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\system32\taskkill.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\system32\taskkill.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\system32\taskkill.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\system32\taskkill.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\system32\taskkill.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\system32\taskkill.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\system32\taskkill.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\system32\taskkill.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\system32\taskkill.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\system32\taskkill.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\system32\tasklist.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| Token: SeIncreaseQuotaPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeSecurityPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeTakeOwnershipPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeLoadDriverPrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
| Token: SeSystemProfilePrivilege | N/A | C:\Windows\System32\Wbem\WMIC.exe | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Views/modifies file attributes
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\system32\attrib.exe | N/A |
Processes
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://mega.nz/file/4nlwxAqL#SRB6SE9FtsJVXmVM_OuUWGUL2GJM7t2fe08Ym2dbty8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc7dda46f8,0x7ffc7dda4708,0x7ffc7dda4718
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2532 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:1
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5540 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5196 /prefetch:8
C:\Windows\system32\AUDIODG.EXE
C:\Windows\system32\AUDIODG.EXE 0x300 0x494
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5676 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6420 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2120,14333501794747352802,17530490096821345146,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6192 /prefetch:8
C:\Users\Admin\Downloads\Tools.exe
"C:\Users\Admin\Downloads\Tools.exe"
C:\Users\Admin\Downloads\Tools.exe
"C:\Users\Admin\Downloads\Tools.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "ver"
C:\Users\Admin\Downloads\Tools.exe
"C:\Users\Admin\Downloads\Tools.exe"
C:\Users\Admin\Downloads\Tools.exe
"C:\Users\Admin\Downloads\Tools.exe"
C:\Users\Admin\Downloads\Tools.exe
"C:\Users\Admin\Downloads\Tools.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist"
C:\Users\Admin\Downloads\Tools.exe
"C:\Users\Admin\Downloads\Tools.exe"
C:\Windows\System32\Wbem\WMIC.exe
wmic csproduct get uuid
C:\Windows\system32\tasklist.exe
tasklist
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "ver"
C:\Users\Admin\Downloads\Tools.exe
"C:\Users\Admin\Downloads\Tools.exe"
C:\Users\Admin\Downloads\Tools.exe
"C:\Users\Admin\Downloads\Tools.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "ver"
C:\Users\Admin\Downloads\Tools.exe
"C:\Users\Admin\Downloads\Tools.exe"
C:\Users\Admin\Downloads\Tools.exe
"C:\Users\Admin\Downloads\Tools.exe"
C:\Users\Admin\Downloads\Tools.exe
"C:\Users\Admin\Downloads\Tools.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "ver"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "ver"
C:\Users\Admin\Downloads\Tools.exe
"C:\Users\Admin\Downloads\Tools.exe"
C:\Users\Admin\Downloads\Tools.exe
"C:\Users\Admin\Downloads\Tools.exe"
C:\Users\Admin\Downloads\Tools.exe
"C:\Users\Admin\Downloads\Tools.exe"
C:\Users\Admin\Downloads\Tools.exe
"C:\Users\Admin\Downloads\Tools.exe"
C:\Users\Admin\Downloads\Tools.exe
"C:\Users\Admin\Downloads\Tools.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "ver"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "ver"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "ver"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe""
C:\Windows\system32\attrib.exe
attrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()""
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist"
C:\Windows\system32\tasklist.exe
tasklist
C:\Windows\system32\mshta.exe
mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 2044"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 2044
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1960"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 1960
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 456"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 456
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 5088"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 5088
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 5100"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 5100
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4896"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 4896
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4848"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 4848
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 3984"
C:\Windows\System32\Conhost.exe
\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\system32\taskkill.exe
taskkill /F /PID 3984
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4236"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 4236
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4652"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 4652
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4960"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 4960
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"
C:\Windows\system32\cmd.exe
cmd.exe /c chcp
C:\Windows\system32\tasklist.exe
tasklist /FO LIST
C:\Windows\system32\cmd.exe
cmd.exe /c chcp
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Get-Clipboard
C:\Windows\system32\chcp.com
chcp
C:\Windows\system32\chcp.com
chcp
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"
C:\Windows\system32\systeminfo.exe
systeminfo
C:\Windows\system32\netsh.exe
netsh wlan show profiles
C:\Windows\system32\HOSTNAME.EXE
hostname
C:\Windows\System32\Wbem\WMIC.exe
wmic logicaldisk get caption,description,providername
C:\Windows\system32\net.exe
net user
C:\Windows\system32\net1.exe
C:\Windows\system32\net1 user
C:\Windows\system32\query.exe
query user
C:\Windows\system32\quser.exe
"C:\Windows\system32\quser.exe"
C:\Windows\system32\net.exe
net localgroup
C:\Windows\system32\net1.exe
C:\Windows\system32\net1 localgroup
C:\Windows\system32\net.exe
net localgroup administrators
C:\Windows\system32\net1.exe
C:\Windows\system32\net1 localgroup administrators
C:\Windows\system32\net.exe
net user guest
C:\Windows\system32\net1.exe
C:\Windows\system32\net1 user guest
C:\Windows\system32\net.exe
net user administrator
C:\Windows\system32\net1.exe
C:\Windows\system32\net1 user administrator
C:\Windows\System32\Wbem\WMIC.exe
wmic startup get caption,command
C:\Windows\system32\tasklist.exe
tasklist /svc
C:\Windows\system32\ipconfig.exe
ipconfig /all
C:\Windows\system32\ROUTE.EXE
route print
C:\Windows\system32\backgroundTaskHost.exe
"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
C:\Windows\system32\ARP.EXE
arp -a
C:\Windows\system32\NETSTAT.EXE
netstat -ano
C:\Windows\system32\sc.exe
sc query type= service state= all
C:\Windows\system32\netsh.exe
netsh firewall show state
C:\Windows\system32\netsh.exe
netsh firewall show config
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
C:\Windows\System32\Wbem\WMIC.exe
wmic csproduct get uuid
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
C:\Windows\System32\Wbem\WMIC.exe
wmic csproduct get uuid
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffc7dd9cc40,0x7ffc7dd9cc4c,0x7ffc7dd9cc58
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1968,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1964 /prefetch:2
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2240 /prefetch:3
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2304,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2516 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3216,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3208 /prefetch:1
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3712,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4572 /prefetch:1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4720,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4736 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4844,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4852 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4952,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5052 /prefetch:8
C:\Windows\system32\svchost.exe
C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4896,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4880 /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=5356,i,3152000765781711257,6203428064526822797,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5116 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffc6dad46f8,0x7ffc6dad4708,0x7ffc6dad4718
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:1
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3928 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3552 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5428 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5736 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5760 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2152,9907651407299237040,4250261294120199968,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6172 /prefetch:8
C:\Users\Admin\Downloads\Tools.exe
"C:\Users\Admin\Downloads\Tools.exe"
C:\Users\Admin\Downloads\Tools.exe
"C:\Users\Admin\Downloads\Tools.exe"
C:\Users\Admin\Downloads\Tools.exe
"C:\Users\Admin\Downloads\Tools.exe"
C:\Users\Admin\Downloads\Tools.exe
"C:\Users\Admin\Downloads\Tools.exe"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "ver"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "ver"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist"
C:\Windows\System32\Wbem\WMIC.exe
wmic csproduct get uuid
C:\Windows\system32\tasklist.exe
tasklist
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()""
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist"
C:\Windows\system32\mshta.exe
mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()"
C:\Windows\system32\tasklist.exe
tasklist
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4540"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 4540
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1884"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 1884
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1416"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 1416
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 2036"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 2036
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 2112"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 2112
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4444"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 4444
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 6120"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 6120
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1436"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 1436
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 5908"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 5908
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 5044"
C:\Windows\System32\Conhost.exe
\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\system32\taskkill.exe
taskkill /F /PID 5044
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 5380"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 5380
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1596"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 1596
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4000"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 4000
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1272"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 1272
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4868"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 4868
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4932"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 4932
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1284"
C:\Windows\system32\taskkill.exe
taskkill /F /PID 1284
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"
C:\Windows\system32\cmd.exe
cmd.exe /c chcp
C:\Windows\system32\chcp.com
chcp
C:\Windows\system32\cmd.exe
cmd.exe /c chcp
C:\Windows\system32\chcp.com
chcp
C:\Windows\system32\tasklist.exe
tasklist /FO LIST
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Get-Clipboard
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"
C:\Windows\system32\systeminfo.exe
systeminfo
C:\Windows\system32\netsh.exe
netsh wlan show profiles
C:\Windows\system32\HOSTNAME.EXE
hostname
C:\Windows\System32\Wbem\WMIC.exe
wmic logicaldisk get caption,description,providername
C:\Windows\system32\net.exe
net user
C:\Windows\system32\net1.exe
C:\Windows\system32\net1 user
C:\Windows\system32\query.exe
query user
C:\Windows\system32\quser.exe
"C:\Windows\system32\quser.exe"
C:\Windows\system32\net.exe
net localgroup
C:\Windows\system32\net1.exe
C:\Windows\system32\net1 localgroup
C:\Windows\system32\net.exe
net localgroup administrators
C:\Windows\system32\net1.exe
C:\Windows\system32\net1 localgroup administrators
C:\Windows\system32\net.exe
net user guest
C:\Windows\system32\net1.exe
C:\Windows\system32\net1 user guest
C:\Windows\system32\net.exe
net user administrator
C:\Windows\system32\net1.exe
C:\Windows\system32\net1 user administrator
C:\Windows\System32\Wbem\WMIC.exe
wmic startup get caption,command
C:\Windows\system32\tasklist.exe
tasklist /svc
C:\Windows\system32\ipconfig.exe
ipconfig /all
C:\Windows\system32\ROUTE.EXE
route print
C:\Windows\system32\ARP.EXE
arp -a
C:\Windows\system32\NETSTAT.EXE
netstat -ano
C:\Windows\system32\sc.exe
sc query type= service state= all
C:\Windows\system32\netsh.exe
netsh firewall show state
C:\Windows\system32\netsh.exe
netsh firewall show config
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
C:\Windows\System32\Wbem\WMIC.exe
wmic csproduct get uuid
C:\Windows\system32\cmd.exe
C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
C:\Windows\System32\Wbem\WMIC.exe
wmic csproduct get uuid
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | mega.nz | udp |
| US | 8.8.8.8:53 | 68.32.126.40.in-addr.arpa | udp |
| LU | 31.216.144.5:443 | mega.nz | tcp |
| LU | 31.216.144.5:443 | mega.nz | tcp |
| LU | 31.216.144.5:443 | mega.nz | tcp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 5.144.216.31.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 196.249.167.52.in-addr.arpa | udp |
| LU | 31.216.144.5:443 | mega.nz | tcp |
| US | 8.8.8.8:53 | eu.static.mega.co.nz | udp |
| LU | 66.203.124.37:443 | eu.static.mega.co.nz | tcp |
| LU | 66.203.124.37:443 | eu.static.mega.co.nz | tcp |
| US | 8.8.8.8:53 | 37.124.203.66.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 43.58.199.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | g.api.mega.co.nz | udp |
| LU | 66.203.125.14:443 | g.api.mega.co.nz | tcp |
| LU | 66.203.125.14:443 | g.api.mega.co.nz | tcp |
| US | 8.8.8.8:53 | 14.125.203.66.in-addr.arpa | udp |
| LU | 66.203.124.37:443 | eu.static.mega.co.nz | tcp |
| N/A | 127.0.0.1:6341 | tcp | |
| N/A | 127.0.0.1:6341 | tcp | |
| N/A | 224.0.0.251:5353 | udp | |
| US | 8.8.8.8:53 | gfs214n165.userstorage.mega.co.nz | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| ES | 185.206.27.75:443 | gfs214n165.userstorage.mega.co.nz | tcp |
| ES | 185.206.27.75:443 | gfs214n165.userstorage.mega.co.nz | tcp |
| ES | 185.206.27.75:443 | gfs214n165.userstorage.mega.co.nz | tcp |
| ES | 185.206.27.75:443 | gfs214n165.userstorage.mega.co.nz | tcp |
| ES | 185.206.27.75:443 | gfs214n165.userstorage.mega.co.nz | tcp |
| ES | 185.206.27.75:443 | gfs214n165.userstorage.mega.co.nz | tcp |
| US | 8.8.8.8:53 | 75.27.206.185.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| N/A | 127.0.0.1:62725 | tcp | |
| US | 8.8.8.8:53 | ip-api.com | udp |
| US | 208.95.112.1:80 | ip-api.com | tcp |
| US | 8.8.8.8:53 | 1.112.95.208.in-addr.arpa | udp |
| N/A | 127.0.0.1:63484 | tcp | |
| N/A | 127.0.0.1:63488 | tcp | |
| N/A | 127.0.0.1:63490 | tcp | |
| US | 8.8.8.8:53 | discord.com | udp |
| US | 162.159.137.232:443 | discord.com | tcp |
| US | 162.159.137.232:443 | discord.com | tcp |
| US | 8.8.8.8:53 | 232.137.159.162.in-addr.arpa | udp |
| US | 8.8.8.8:53 | www.google.com | udp |
| GB | 142.250.179.228:443 | www.google.com | udp |
| US | 8.8.8.8:53 | 3.213.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.213.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 227.187.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.179.250.142.in-addr.arpa | udp |
| US | 8.8.8.8:53 | ogads-pa.googleapis.com | udp |
| US | 8.8.8.8:53 | apis.google.com | udp |
| GB | 216.58.201.110:443 | apis.google.com | udp |
| GB | 172.217.169.10:443 | ogads-pa.googleapis.com | udp |
| GB | 172.217.169.10:443 | ogads-pa.googleapis.com | tcp |
| US | 8.8.8.8:53 | 110.201.58.216.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 10.169.217.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | play.google.com | udp |
| GB | 172.217.16.238:443 | play.google.com | udp |
| GB | 172.217.16.238:443 | play.google.com | tcp |
| US | 8.8.8.8:53 | 238.16.217.172.in-addr.arpa | udp |
| US | 8.8.8.8:53 | clients2.google.com | udp |
| GB | 142.250.178.14:443 | clients2.google.com | udp |
| GB | 142.250.178.14:443 | clients2.google.com | tcp |
| US | 8.8.8.8:53 | api.gofile.io | udp |
| FR | 45.112.123.126:443 | api.gofile.io | tcp |
| US | 8.8.8.8:53 | 14.178.250.142.in-addr.arpa | udp |
| N/A | 127.0.0.1:63688 | tcp | |
| N/A | 127.0.0.1:63690 | tcp | |
| US | 8.8.8.8:53 | store1.gofile.io | udp |
| US | 8.8.8.8:53 | 126.123.112.45.in-addr.arpa | udp |
| FR | 45.112.123.227:443 | store1.gofile.io | tcp |
| US | 8.8.8.8:53 | 227.123.112.45.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 240.221.184.93.in-addr.arpa | udp |
| US | 162.159.137.232:443 | discord.com | tcp |
| US | 8.8.8.8:53 | mega.nz | udp |
| LU | 31.216.145.5:443 | mega.nz | tcp |
| LU | 31.216.145.5:443 | mega.nz | tcp |
| LU | 66.203.125.14:443 | g.api.mega.co.nz | tcp |
| LU | 66.203.125.14:443 | g.api.mega.co.nz | tcp |
| US | 8.8.8.8:53 | 5.145.216.31.in-addr.arpa | udp |
| N/A | 127.0.0.1:6341 | tcp | |
| N/A | 127.0.0.1:6341 | tcp | |
| ES | 185.206.27.75:443 | gfs214n165.userstorage.mega.co.nz | tcp |
| ES | 185.206.27.75:443 | gfs214n165.userstorage.mega.co.nz | tcp |
| ES | 185.206.27.75:443 | gfs214n165.userstorage.mega.co.nz | tcp |
| ES | 185.206.27.75:443 | gfs214n165.userstorage.mega.co.nz | tcp |
| N/A | 127.0.0.1:54019 | tcp | |
| US | 208.95.112.1:80 | ip-api.com | tcp |
| N/A | 127.0.0.1:54055 | tcp | |
| N/A | 127.0.0.1:54057 | tcp | |
| N/A | 127.0.0.1:54059 | tcp | |
| US | 162.159.137.232:443 | discord.com | tcp |
| US | 8.8.8.8:53 | tse1.mm.bing.net | udp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 150.171.28.10:443 | tse1.mm.bing.net | tcp |
| US | 162.159.137.232:443 | discord.com | tcp |
| US | 8.8.8.8:53 | 10.28.171.150.in-addr.arpa | udp |
| FR | 45.112.123.126:443 | api.gofile.io | tcp |
| FR | 45.112.123.227:443 | store1.gofile.io | tcp |
| N/A | 127.0.0.1:51128 | tcp | |
| N/A | 127.0.0.1:51130 | tcp | |
| US | 162.159.137.232:443 | discord.com | tcp |
Files
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 34d2c4f40f47672ecdf6f66fea242f4a |
| SHA1 | 4bcad62542aeb44cae38a907d8b5a8604115ada2 |
| SHA256 | b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33 |
| SHA512 | 50fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6 |
\??\pipe\LOCAL\crashpad_2044_QEAMMNHUPQNYNFPJ
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 8749e21d9d0a17dac32d5aa2027f7a75 |
| SHA1 | a5d555f8b035c7938a4a864e89218c0402ab7cde |
| SHA256 | 915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304 |
| SHA512 | c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | a8d28e983cb5e081fc0a72d9c69e57a2 |
| SHA1 | 69d0819f10443312ee6dd9bacf0f33b724bd61be |
| SHA256 | ccf89c2cd8a5da224016fcf93080766e4f6e8c1959ab83c3fc1d59d35e75be06 |
| SHA512 | b23cad8867ab999abe4704c115bd6023b8b9326f81abfa30413414701b0b45078b815f9bbe768b4fc32ffb5d77dd3cdcdc459803c79deba786a44f65a3c94f9c |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\IndexedDB\https_mega.nz_0.indexeddb.leveldb\CURRENT
| MD5 | 46295cac801e5d4857d09837238a6394 |
| SHA1 | 44e0fa1b517dbf802b18faf0785eeea6ac51594b |
| SHA256 | 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443 |
| SHA512 | 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\MANIFEST-000001
| MD5 | 5af87dfd673ba2115e2fcf5cfdb727ab |
| SHA1 | d5b5bbf396dc291274584ef71f444f420b6056f1 |
| SHA256 | f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4 |
| SHA512 | de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 6752a1d65b201c13b62ea44016eb221f |
| SHA1 | 58ecf154d01a62233ed7fb494ace3c3d4ffce08b |
| SHA256 | 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd |
| SHA512 | 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | 13c2411f6efb59ada139e387e49fc1bf |
| SHA1 | 7fc85a382b76585af4d1dc451cae8d5528bad3a9 |
| SHA256 | c2f86f8209efe938e3f507165ce6141a9bfa3fddb9f1962a1a043f16a4709d4f |
| SHA512 | b0c442174cc6389e72a2bfb78ac68157d7f3e63648aeb604bcaf4ed07ccd3df86ad3de1c8f53bd857edbf1aa8edd3da229a73461fb07f1adc7b0bc1b2fd60913 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 6d67599d6b098b226a376e2a17931b11 |
| SHA1 | 4143f230bad0fe043651165da0b6aa98ed73de4c |
| SHA256 | 51941f833d15a4036f9951444e076b448639f097ed881bd4bb2e8da8cbcdec19 |
| SHA512 | 202b3c9acfb36a314aea60abc1692f11f6c8bbd45100fff61228f6e1b8e05f3c484ed93403dd0e9e60216ed5a9aa031880adeff0d2fd2545d5c51868a9b526fb |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000023
| MD5 | 950eca48e414acbe2c3b5d046dcb8521 |
| SHA1 | 1731f264e979f18cdf08c405c7b7d32789a6fb59 |
| SHA256 | c0bbe530abfce19e06697bc4358eb426e076ccdb9113e22df4a6f32085da67a2 |
| SHA512 | 27e55525ade4d099a6881011f6e2e0d5d3a9ca7181f4f014dc231d40b3b1907d0d437b0c44d336c25dd7b73209cd773b8563675ac260c43c7752e2d2d694d4d9 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
| MD5 | 1fd63e52b03b1a5ccf7cfd57b41cfd29 |
| SHA1 | f34d88fe127a339cc5de7b4eefdc2ec6b03866f9 |
| SHA256 | fd96dc29e789b571be51e31bad5609ba45c8c1ab0940d74cfac224d9eeb2aefc |
| SHA512 | 3e4c475dde775752e6b51dc3917fd3c0cf3e47970c22e5400dba35505ef9d9b9941d16285027856c2074f856d42050d51e15df4ae5057a598ba6f9738da5f810 |
C:\Users\Admin\Downloads\Tools.exe
| MD5 | 9ef872cbbbbc5bb4b1ee521ef0203930 |
| SHA1 | a0be1aff9a8feec9f847e6d1ef2a1f41eb5c062d |
| SHA256 | 41d0d7f4aeb95e0ef2b69f00b443b82f9cfab03dd47ca80cbb61ac8ae9b714ea |
| SHA512 | 4e250cd530e00b302082579fca6ae2a2d44058e5a288fc5fe809a040866702da84305060ced7f6fa89210e1e5811391142e4a4fe1917c71d60583378f4446dc1 |
C:\Users\Admin\AppData\Local\Temp\_MEI55562\python311.dll
| MD5 | db09c9bbec6134db1766d369c339a0a1 |
| SHA1 | c156d9f2d0e80b4cf41794cd9b8b1e8a352e0a0b |
| SHA256 | b1aac1e461174bbae952434e4dac092590d72b9832a04457c94bd9bb7ee8ad79 |
| SHA512 | 653a7fff6a2b6bffb9ea2c0b72ddb83c9c53d555e798eea47101b0d932358180a01af2b9dab9c27723057439c1eaffb8d84b9b41f6f9cd1c3c934f1794104d45 |
C:\Users\Admin\AppData\Local\Temp\_MEI55562\VCRUNTIME140.dll
| MD5 | f12681a472b9dd04a812e16096514974 |
| SHA1 | 6fd102eb3e0b0e6eef08118d71f28702d1a9067c |
| SHA256 | d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8 |
| SHA512 | 7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2 |
memory/5868-248-0x00007FFC6A030000-0x00007FFC6A618000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI55562\python3.DLL
| MD5 | 34e49bb1dfddf6037f0001d9aefe7d61 |
| SHA1 | a25a39dca11cdc195c9ecd49e95657a3e4fe3215 |
| SHA256 | 4055d1b9e553b78c244143ab6b48151604003b39a9bf54879dee9175455c1281 |
| SHA512 | edb715654baaf499cf788bcacd5657adcf9f20b37b02671abe71bda334629344415ed3a7e95cb51164e66a7aa3ed4bf84acb05649ccd55e3f64036f3178b7856 |
C:\Users\Admin\AppData\Local\Temp\_MEI55562\base_library.zip
| MD5 | 2a138e2ee499d3ba2fc4afaef93b7caa |
| SHA1 | 508c733341845e94fce7c24b901fc683108df2a8 |
| SHA256 | 130e506ead01b91b60d6d56072c468aeb5457dd0f2ecd6ce17dfcbb7d51a1f8c |
| SHA512 | 1f61a0fda5676e8ed8d10dfee78267f6d785f9c131f5caf2dd984e18ca9e5866b7658ab7edb2ffd74920a40ffea5cd55c0419f5e9ee57a043105e729e10d820b |
C:\Users\Admin\AppData\Local\Temp\_MEI55562\libffi-8.dll
| MD5 | decbba3add4c2246928ab385fb16a21e |
| SHA1 | 5f019eff11de3122ffa67a06d52d446a3448b75e |
| SHA256 | 4b43c1e42f6050ddb8e184c8ec4fb1de4a6001e068ece8e6ad47de0cc9fd4a2d |
| SHA512 | 760a42a3eb3ca13fa7b95d3bd0f411c270594ae3cf1d3cda349fa4f8b06ebe548b60cd438d68e2da37de0bc6f1c711823f5e917da02ed7047a45779ee08d7012 |
memory/5868-277-0x00007FFC7D800000-0x00007FFC7D80F000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI55562\_uuid.pyd
| MD5 | 3377ae26c2987cfee095dff160f2c86c |
| SHA1 | 0ca6aa60618950e6d91a7dea530a65a1cdf16625 |
| SHA256 | 9534cb9c997a17f0004fb70116e0141bdd516373b37bbd526d91ad080daa3a2b |
| SHA512 | 8e408b84e2130ff48b8004154d1bdf6a08109d0b40f9fafb6f55e9f215e418e05dca819f411c802792a9d9936a55d6b90460121583e5568579a0fda6935852ee |
memory/5868-285-0x00007FFC6AC40000-0x00007FFC6AC6D000-memory.dmp
memory/5868-289-0x00007FFC69EB0000-0x00007FFC6A023000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI55562\sqlite3.dll
| MD5 | 895f001ae969364432372329caf08b6a |
| SHA1 | 4567fc6672501648b277fe83e6b468a7a2155ddf |
| SHA256 | f5dd29e1e99cf8967f7f81487dc624714dcbec79c1630f929d5507fc95cbfad7 |
| SHA512 | 05b4559d283ea84174da72a6c11b8b93b1586b4e7d8cda8d745c814f8f6dff566e75f9d7890f32bd9dfe43485244973860f83f96ba39296e28127c9396453261 |
C:\Users\Admin\AppData\Local\Temp\_MEI55562\libcrypto-1_1.dll
| MD5 | 86cfc84f8407ab1be6cc64a9702882ef |
| SHA1 | 86f3c502ed64df2a5e10b085103c2ffc9e3a4130 |
| SHA256 | 11b89cc5531b2a6b89fbbb406ebe8fb01f0bf789e672131b0354e10f9e091307 |
| SHA512 | b33f59497127cb1b4c1781693380576187c562563a9e367ce8abc14c97c51053a28af559cdd8bd66181012083e562c8a8771e3d46adeba269a848153a8e9173c |
memory/5868-296-0x00007FFC69DF0000-0x00007FFC69EA8000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI55562\_asyncio.pyd
| MD5 | 1b8ce772a230a5da8cbdccd8914080a5 |
| SHA1 | 40d4faf1308d1af6ef9f3856a4f743046fd0ead5 |
| SHA256 | fa5a1e7031de5849ab2ab5a177e366b41e1df6bbd90c8d2418033a01c740771f |
| SHA512 | d2fc21b9f58b57065b337c3513e7e6c3e2243b73c5a230e81c91dafcb6724b521ad766667848ba8d0a428d530691ffc4020de6ce9ce1eaa2bf5e15338114a603 |
C:\Users\Admin\AppData\Local\Temp\_MEI55562\_hashlib.pyd
| MD5 | 0629bdb5ff24ce5e88a2ddcede608aee |
| SHA1 | 47323370992b80dafb6f210b0d0229665b063afb |
| SHA256 | f404bb8371618bbd782201f092a3bcd7a96d3c143787ebea1d8d86ded1f4b3b8 |
| SHA512 | 3faeff1a19893257c17571b89963af37534c189421585ea03dd6a3017d28803e9d08b0e4daceee01ffeda21da60e68d10083fe7dbdbbde313a6b489a40e70952 |
C:\Users\Admin\AppData\Local\Temp\_MEI55562\yarl\_quoting_c.cp311-win_amd64.pyd
| MD5 | 1fa0ad3deb7f851a231c1a973b121b93 |
| SHA1 | 65ae7bb5fec98da8665c70290c40082c8358b688 |
| SHA256 | 0054d20391ebcd1ed30ef2d5aaa1efbbc5aceb7d8f716c16de0ac0d9d2680121 |
| SHA512 | 64b6cf9d90daca0fb5e2d0eb91c853edaa2fb90edea064b96032ce968ee46961464772e353bf503e05b05471330c5afc8ffc72273e6ebdb6b1ad22fbce331fbf |
memory/5868-310-0x00007FFC6A8D0000-0x00007FFC6A8F2000-memory.dmp
memory/5868-312-0x00007FFC6A790000-0x00007FFC6A7AB000-memory.dmp
memory/5868-315-0x00007FFC6A750000-0x00007FFC6A769000-memory.dmp
memory/5868-319-0x00007FFC6A6E0000-0x00007FFC6A6F1000-memory.dmp
memory/5868-325-0x00007FFC6A6C0000-0x00007FFC6A6DE000-memory.dmp
memory/5868-324-0x00007FFC69A70000-0x00007FFC69DE5000-memory.dmp
memory/5868-323-0x00007FFC69DF0000-0x00007FFC69EA8000-memory.dmp
memory/5868-326-0x00007FFC692E0000-0x00007FFC69A6A000-memory.dmp
memory/5868-322-0x00007FFC772A0000-0x00007FFC772AA000-memory.dmp
memory/5868-321-0x00000170714B0000-0x0000017071825000-memory.dmp
memory/5868-320-0x00007FFC6ABE0000-0x00007FFC6AC0E000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index
| MD5 | af2f393581b8e80d65dcaf770bb8e53a |
| SHA1 | aace74f455d781eccb1dd93cd87b37fa53371a75 |
| SHA256 | f852eede99089c9d275b5e1eac64f5882dec08b7aba7b8c1db6b1666f1fd769a |
| SHA512 | fde646388c2c87cedbdda0830512e6fd8f8431df2cc29b366ed6e0cc34f7922ba705e59ae36afa48ac70ab89ac4fd93c799c3eaa3661eeec35f21e288c166283 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\ScriptCache\index-dir\the-real-index~RFe57e61a.TMP
| MD5 | 4559408479ebabea512b6c1e4886b99e |
| SHA1 | 9fa8548ed4116d35cd25c77081a518e42ef40b3a |
| SHA256 | 8576e8d04503f481016a4087ba1be5f5b466e366d1b551f61f5cf9f3b527ce4c |
| SHA512 | bbc2d14102229e4a980c056b5a794f4b259f6338bb9339b89c23a88a7bbf5acaf74976cbcd70834b69ec8f7871c76feab53e89bdb07cbed6ecdc00a94199ceb8 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 1153120355d3b6b89e8d04b59ca7fdad |
| SHA1 | fddd22d01fdb2e495549d597352a24b437a7d309 |
| SHA256 | b00fdb83fdc1992617eacc6b9fdfe31ae3ec5c68b3d86a5eee2316234df739d7 |
| SHA512 | 0cd3895693091160567defa0a8ff4f6b93139ef680a291b30375387a706828c08e44a959e8f680287655da7677450b1b5bb984ea1b45686fd60dcea141303e17 |
memory/5708-427-0x00007FFC68CF0000-0x00007FFC692D8000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI57442\attrs-24.2.0.dist-info\INSTALLER
| MD5 | 365c9bfeb7d89244f2ce01c1de44cb85 |
| SHA1 | d7a03141d5d6b1e88b6b59ef08b6681df212c599 |
| SHA256 | ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508 |
| SHA512 | d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1 |
memory/5708-445-0x00007FFC686D0000-0x00007FFC686F4000-memory.dmp
memory/5708-448-0x00007FFC6F7D0000-0x00007FFC6F7DD000-memory.dmp
memory/5708-449-0x00007FFC686B0000-0x00007FFC686C9000-memory.dmp
memory/5708-452-0x00007FFC68650000-0x00007FFC68673000-memory.dmp
memory/5708-451-0x00007FFC684D0000-0x00007FFC68643000-memory.dmp
memory/5708-450-0x00007FFC68680000-0x00007FFC686AD000-memory.dmp
memory/5708-462-0x00007FFC684A0000-0x00007FFC684CE000-memory.dmp
memory/6052-467-0x00007FFC67E00000-0x00007FFC67E2E000-memory.dmp
memory/5708-473-0x00007FFC671A0000-0x00007FFC672BC000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI55642\unicodedata.pyd
| MD5 | 06a5e52caf03426218f0c08fc02cc6b8 |
| SHA1 | ae232c63620546716fbb97452d73948ebfd06b35 |
| SHA256 | 118c31faa930f2849a14c3133df36420a5832114df90d77b09cde0ad5f96f33a |
| SHA512 | 546b1a01f36d3689b0fdeeda8b1ce55e7d3451731ca70fffe6627d542fff19d7a70e27147cab1920aae8bed88272342908d4e9d671d7aba74abb5db398b90718 |
memory/5708-579-0x00007FFC684D0000-0x00007FFC68643000-memory.dmp
memory/5824-578-0x00007FFC65720000-0x00007FFC65D08000-memory.dmp
memory/5824-590-0x00007FFC66B00000-0x00007FFC66B24000-memory.dmp
memory/6052-589-0x00007FFC679C0000-0x00007FFC67A78000-memory.dmp
memory/5708-588-0x00007FFC68650000-0x00007FFC68673000-memory.dmp
memory/5824-587-0x00007FFC680C0000-0x00007FFC680CD000-memory.dmp
memory/5708-581-0x00007FFC67EF0000-0x00007FFC67FA8000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | d9e73c1c707edf3819f9609a0fe5b618 |
| SHA1 | 8e4b2c3bb54cd75cf264a796de860b48a3963016 |
| SHA256 | 35657e468f476c7489a9cab3df6c35918d986e8e8739c2d4d538cf813c4f62f9 |
| SHA512 | 176eabd010519c89277fecd48c23097ad3a03f9c02760f35cd3d2d2170e9e1f3b39729ad37f927d937afcf73c77732796ca2898038d4b9c9ffe87571dae66527 |
memory/5708-816-0x00007FFC630B0000-0x00007FFC630E7000-memory.dmp
memory/5708-815-0x00007FFC642A0000-0x00007FFC64A2A000-memory.dmp
memory/6052-847-0x00007FFC63700000-0x00007FFC63E8A000-memory.dmp
memory/6052-848-0x00007FFC62A60000-0x00007FFC62A97000-memory.dmp
memory/5824-884-0x00007FFC65720000-0x00007FFC65D08000-memory.dmp
memory/6052-846-0x00007FFC63E90000-0x00007FFC63EAE000-memory.dmp
memory/6052-845-0x00007FFC67880000-0x00007FFC6788A000-memory.dmp
memory/6052-844-0x00007FFC63EB0000-0x00007FFC63EC1000-memory.dmp
memory/6052-843-0x00007FFC63ED0000-0x00007FFC63F1D000-memory.dmp
memory/6052-842-0x00007FFC63F20000-0x00007FFC63F39000-memory.dmp
memory/6052-841-0x00007FFC63F40000-0x00007FFC63F56000-memory.dmp
memory/6052-839-0x00007FFC66B70000-0x00007FFC66C8C000-memory.dmp
memory/6052-838-0x00007FFC67150000-0x00007FFC67172000-memory.dmp
memory/6052-837-0x00007FFC67180000-0x00007FFC67194000-memory.dmp
memory/6052-836-0x00007FFC67940000-0x00007FFC67954000-memory.dmp
memory/6052-835-0x00007FFC67960000-0x00007FFC67972000-memory.dmp
memory/6052-833-0x00007FFC679C0000-0x00007FFC67A78000-memory.dmp
memory/6052-832-0x00007FFC66C90000-0x00007FFC67005000-memory.dmp
memory/6052-830-0x00007FFC67A80000-0x00007FFC67BF3000-memory.dmp
memory/6052-825-0x00007FFC680D0000-0x00007FFC680E9000-memory.dmp
memory/5708-814-0x00007FFC662A0000-0x00007FFC662BE000-memory.dmp
memory/5708-813-0x00007FFC67930000-0x00007FFC6793A000-memory.dmp
memory/5708-812-0x00007FFC662E0000-0x00007FFC662F1000-memory.dmp
memory/5708-811-0x00007FFC66300000-0x00007FFC6634D000-memory.dmp
memory/5708-810-0x00007FFC66350000-0x00007FFC66369000-memory.dmp
memory/5708-809-0x00007FFC66370000-0x00007FFC66386000-memory.dmp
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
| MD5 | 008114e1a1a614b35e8a7515da0f3783 |
| SHA1 | 3c390d38126c7328a8d7e4a72d5848ac9f96549b |
| SHA256 | 7301b76033c2970e61bab5eaddaff5aa652c39db5c0ea5632814f989716a1d18 |
| SHA512 | a202fc891eace003c346bad7e5d2c73dadf9591d5ce950395ff4b63cc2866b17e02bd3f0ad92749df033a936685851455bcdbfad30f26e765c3c89d3309cb82b |
memory/5708-800-0x00007FFC680F0000-0x00007FFC68465000-memory.dmp
memory/5708-808-0x00007FFC679A0000-0x00007FFC679BB000-memory.dmp
memory/5708-807-0x00007FFC671A0000-0x00007FFC672BC000-memory.dmp
memory/5708-806-0x00007FFC67D90000-0x00007FFC67DB2000-memory.dmp
memory/5708-805-0x00007FFC67DC0000-0x00007FFC67DD4000-memory.dmp
memory/5708-804-0x00007FFC67DE0000-0x00007FFC67DF4000-memory.dmp
memory/5708-803-0x00007FFC67E30000-0x00007FFC67E42000-memory.dmp
memory/5708-802-0x00007FFC67E50000-0x00007FFC67E65000-memory.dmp
memory/5708-801-0x00007FFC67EF0000-0x00007FFC67FA8000-memory.dmp
memory/5708-799-0x00007FFC684A0000-0x00007FFC684CE000-memory.dmp
memory/5708-798-0x00007FFC684D0000-0x00007FFC68643000-memory.dmp
memory/5708-790-0x00007FFC68CF0000-0x00007FFC692D8000-memory.dmp
memory/5708-796-0x00007FFC68680000-0x00007FFC686AD000-memory.dmp
memory/5708-795-0x00007FFC686B0000-0x00007FFC686C9000-memory.dmp
memory/5708-580-0x00007FFC680F0000-0x00007FFC68465000-memory.dmp
memory/5824-586-0x00007FFC66A90000-0x00007FFC66AA9000-memory.dmp
memory/6140-585-0x00007FFC6BA20000-0x00007FFC6BA2F000-memory.dmp
memory/6140-584-0x00007FFC66AB0000-0x00007FFC66AD4000-memory.dmp
memory/5824-583-0x00007FFC6BD90000-0x00007FFC6BD9F000-memory.dmp
memory/6140-582-0x00007FFC65130000-0x00007FFC65718000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI55642\select.pyd
| MD5 | c39459806c712b3b3242f8376218c1e1 |
| SHA1 | 85d254fb6cc5d6ed20a04026bff1158c8fd0a530 |
| SHA256 | 7cbd4339285d145b422afa280cee685258bc659806be9cf8b334805bc45b29c9 |
| SHA512 | b727c6d1cd451d658e174161135d3be48d7efda21c775b8145bc527a54d6592bfc50919276c6498d2e2233ac1524c1699f59f0f467cc6e43e5b5e9558c87f49d |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\pyexpat.pyd
| MD5 | fe0e32bfe3764ed5321454e1a01c81ec |
| SHA1 | 7690690df0a73bdcc54f0f04b674fc8a9a8f45fb |
| SHA256 | b399bff10812e9ea2c9800f74cb0e5002f9d9379baf1a3cef9d438caca35dc92 |
| SHA512 | d1777f9e684a9e4174e18651e6d921ae11757ecdbeb4ee678c6a28e0903a4b9ab9f6e1419670b4d428ee20f86c7d424177ed9daf4365cf2ee376fcd065c1c92d |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\propcache\_helpers_c.cp311-win_amd64.pyd
| MD5 | 16d88c0afeecf94b78f1497b1072b0fe |
| SHA1 | d710adfd375d7ffda0fa4986ba48a13708a7ca91 |
| SHA256 | a6d81bfe53de077332b82094d20b04d57efcaa0c58c7b6eb6240fd0626d35409 |
| SHA512 | fa6e392c7b9c1c8907b7646fac518e908d9bfbcc65ea3464f531ff5af39e3e8cfb314e3d13ed4041ffda692b364c2f7d5617aaf9867bbeeff1e08d286a5ae2ae |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\multidict\_multidict.cp311-win_amd64.pyd
| MD5 | 5587c32d9bf7f76e1a9565df8b1b649f |
| SHA1 | 52ae204a65c15a09ecc73e7031e3ac5c3dcb71b2 |
| SHA256 | 7075185db068e3c8f1b7db75e5aa5c500fc76ed8270c6abc6f49681d7119a782 |
| SHA512 | f21d0530389138457d6fdcdb3487a3c8b030338c569b2742f9e691e43af1d9e779c98426bad81b152f343b324a9375fe1322ef74030b1c8f8ba606d19e562e97 |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\libssl-1_1.dll
| MD5 | 6cd33578bc5629930329ca3303f0fae1 |
| SHA1 | f2f8e3248a72f98d27f0cfa0010e32175a18487f |
| SHA256 | 4150ee603ad2da7a6cb6a895cb5bd928e3a99af7e73c604de1fc224e0809fdb0 |
| SHA512 | c236a6ccc8577c85509d378c1ef014621cab6f6f4aa26796ff32d8eec8e98ded2e55d358a7d236594f7a48646dc2a6bf25b42a37aed549440d52873ebca4713e |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\frozenlist\_frozenlist.cp311-win_amd64.pyd
| MD5 | 4958b93afcea376c56d67eb2d70645bc |
| SHA1 | a5b31435c2925b585a14666cb23682bcba38a576 |
| SHA256 | bfeb41b7d1aeae29992a44dc992fd7c752b87b0f87d67cf452eba15e85341cbe |
| SHA512 | be32abe68cef6c8e396de42f2b5adaff4373172b5b980e1bfff0944330f1bfad92b58cf00997f072da129522cd14b54d48b8a39dba1d3e0798ad863d7ba32a39 |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\cryptography\hazmat\bindings\_rust.pyd
| MD5 | 27bfdc1a00eb382f490991a6507cc3f2 |
| SHA1 | 162bc0ddf111968bfd69246660cf650f89b5b7bc |
| SHA256 | 788d5c28a70e2bc4e695c827aec70e0869ad7bfdd1f0f4f75231d6f8d83450c2 |
| SHA512 | 6fcc538c0f901f8543cf296b981a68eb6271f72ddcd106b69b45e0ebd166a355299ce23e999aa855d23edd69f95f53b653f92772435a42c72001386cdb423899 |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\cryptography-43.0.3.dist-info\license_files\LICENSE.BSD
| MD5 | 5ae30ba4123bc4f2fa49aa0b0dce887b |
| SHA1 | ea5b412c09f3b29ba1d81a61b878c5c16ffe69d8 |
| SHA256 | 602c4c7482de6479dd2e9793cda275e5e63d773dacd1eca689232ab7008fb4fb |
| SHA512 | ddbb20c80adbc8f4118c10d3e116a5cd6536f72077c5916d87258e155be561b89eb45c6341a1e856ec308b49a4cb4dba1408eabd6a781fbe18d6c71c32b72c41 |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\cryptography-43.0.3.dist-info\license_files\LICENSE.APACHE
| MD5 | 4e168cce331e5c827d4c2b68a6200e1b |
| SHA1 | de33ead2bee64352544ce0aa9e410c0c44fdf7d9 |
| SHA256 | aac73b3148f6d1d7111dbca32099f68d26c644c6813ae1e4f05f6579aa2663fe |
| SHA512 | f451048e81a49fbfa11b49de16ff46c52a8e3042d1bcc3a50aaf7712b097bed9ae9aed9149c21476c2a1e12f1583d4810a6d36569e993fe1ad3879942e5b0d52 |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\cryptography-43.0.3.dist-info\license_files\LICENSE
| MD5 | 8c3617db4fb6fae01f1d253ab91511e4 |
| SHA1 | e442040c26cd76d1b946822caf29011a51f75d6d |
| SHA256 | 3e0c7c091a948b82533ba98fd7cbb40432d6f1a9acbf85f5922d2f99a93ae6bb |
| SHA512 | 77a1919e380730bcce5b55d76fbffba2f95874254fad955bd2fe1de7fc0e4e25b5fdaab0feffd6f230fa5dc895f593cf8bfedf8fdc113efbd8e22fadab0b8998 |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\cryptography-43.0.3.dist-info\WHEEL
| MD5 | c869d30012a100adeb75860f3810c8c9 |
| SHA1 | 42fd5cfa75566e8a9525e087a2018e8666ed22cb |
| SHA256 | f3fe049eb2ef6e1cc7db6e181fc5b2a6807b1c59febe96f0affcc796bdd75012 |
| SHA512 | b29feaf6587601bbe0edad3df9a87bfc82bb2c13e91103699babd7e039f05558c0ac1ef7d904bcfaf85d791b96bc26fa9e39988dd83a1ce8ecca85029c5109f0 |
memory/6052-554-0x00007FFC67130000-0x00007FFC6714B000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI55642\cryptography-43.0.3.dist-info\RECORD
| MD5 | 01123b16f8b6a298539243e0b73ce434 |
| SHA1 | dbf71311e9540325b8d60fae25576fd1cca912ff |
| SHA256 | 887833e03f8f5805ca3f7c25223f6740e9e924369b30750424c7487977815933 |
| SHA512 | e70f1c8a129ee7184445410223ae132f313f7e47aabda5b5deeacfb29a0bea38a324d7e0fcfe071f00a945ab143af876a405de01b3796d3f337e735e100e5e46 |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\cryptography-43.0.3.dist-info\METADATA
| MD5 | c891cd93024af027647e6de89d0ffce2 |
| SHA1 | 01d8d6f93f1b922a91c82d4711bcefb885ad47b0 |
| SHA256 | eb36e0e4251e8479ef36964440755ef22bedd411ba87a93f726fa8e5bb0e64b0 |
| SHA512 | 3386fbb3dcf7383b2d427093624c531c50be34e3e0aa0984547b953e04776d0d431d5267827f4194a9b0ad1ab897869115623e802a6a1c5d2ae1ad82c96cce71 |
memory/6052-540-0x00007FFC66B70000-0x00007FFC66C8C000-memory.dmp
memory/6052-538-0x00007FFC67180000-0x00007FFC67194000-memory.dmp
memory/6052-539-0x00007FFC67150000-0x00007FFC67172000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI55642\attrs-24.2.0.dist-info\licenses\LICENSE
| MD5 | 5e55731824cf9205cfabeab9a0600887 |
| SHA1 | 243e9dd038d3d68c67d42c0c4ba80622c2a56246 |
| SHA256 | 882115c95dfc2af1eeb6714f8ec6d5cbcabf667caff8729f42420da63f714e9f |
| SHA512 | 21b242bf6dcbafa16336d77a40e69685d7e64a43cc30e13e484c72a93cd4496a7276e18137dc601b6a8c3c193cb775db89853ecc6d6eb2956deee36826d5ebfe |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\attrs-24.2.0.dist-info\WHEEL
| MD5 | 52adfa0c417902ee8f0c3d1ca2372ac3 |
| SHA1 | b67635615eef7e869d74f4813b5dc576104825dd |
| SHA256 | d7215d7625cc9af60aed0613aad44db57eba589d0ccfc3d8122114a0e514c516 |
| SHA512 | bfa87e7b0e76e544c2108ef40b9fac8c5ff4327ab8ede9feb2891bd5d38fea117bd9eebaf62f6c357b4deaddad5a5220e0b4a54078c8c2de34cb1dd5e00f2d62 |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\attrs-24.2.0.dist-info\RECORD
| MD5 | 8037e693eafed6c3d0cce916babb50c4 |
| SHA1 | 2321392aab7ae3a6a78248e5d5f454124d368ec1 |
| SHA256 | 688073f6556808d9139fea52bec3802d8c0d7ce07978b98aae8db5c98facc0df |
| SHA512 | 95b9e6b8f946d2617098c338441afc5a555ff208947d5731e09ee17b959655161c397f57e14827a95a8fd4554de8c6e426dc316f858510ae4aa7ca8723c4cf51 |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\attrs-24.2.0.dist-info\METADATA
| MD5 | 49cabcb5f8da14c72c8c3d00adb3c115 |
| SHA1 | f575becf993ecdf9c6e43190c1cb74d3556cf912 |
| SHA256 | dc9824e25afd635480a8073038b3cdfe6a56d3073a54e1a6fb21edd4bb0f207c |
| SHA512 | 923daeee0861611d230df263577b3c382ae26400ca5f1830ee309bd6737eed2ad934010d61cdd4796618bedb3436cd772d9429a5bed0a106ef7de60e114e505c |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\aiohttp\_websocket.cp311-win_amd64.pyd
| MD5 | 86a658eb19727b88129c283fd6fcc33c |
| SHA1 | e64da6c74518e96186a428d5f19e376710a7f7a4 |
| SHA256 | 1c331eba1fb262ae878124456291c38a7bf342c1bec107e06fdc7a704f6ce937 |
| SHA512 | ee23ef0dd8fb9ca02d16923da2b0d2175975322afdf35274f7fb8350baa6c8ec044d24f371ad147336e8948a19e10a93b8b8edc8ca2f6f99e330e502e7200c95 |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\aiohttp\_http_writer.cp311-win_amd64.pyd
| MD5 | 69c4149247d7fb6958a1a38efdcedc63 |
| SHA1 | d530e7da9910bca8b78a5fd1fc1dffc0e8bf5752 |
| SHA256 | ecae08a8ed98388a987bc36ad231e4e63d21e9ccb59376bc46cc22ea769f5e99 |
| SHA512 | 2678d369a83a786b6adcacf3beebce723b9c7cf81823fd6a5e6931773b1b1b0c2b56f7a0f2c80ac2b96d38fa7496049a584f81a61260ae97095abf1ce98dff29 |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\aiohttp\_http_parser.cp311-win_amd64.pyd
| MD5 | c2020c40f438f0cc39b2017758a1b7b4 |
| SHA1 | 4ebe220f1b72c9daec854bbeda64396f462742d7 |
| SHA256 | 7374dd42a06745a6e293c55c8cfce56aaeb380a8209913ec48c5a691f2593a75 |
| SHA512 | d5eb7499270b192f34981386ab2cca8161c18565474f44aec34c0aeb67c489bf65dfed3fa2ae27e631f523c305c9b5ed8c1fe030f5045a25a7fb1174e7597900 |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\aiohttp\_helpers.cp311-win_amd64.pyd
| MD5 | 6329786659cdb8b94266f7f602e093ca |
| SHA1 | 26b3462eef66b2b447b7f25aa731e0d8b0ef6d0b |
| SHA256 | 219f86dcf68ee6e197eaa004db824db672bfd7a4334b48c916b4ec05f6ebcf4d |
| SHA512 | aa62673e136b896edc2fcd1bc39f066ae2443e760a68797e60487dbd5625b3a54b2ed3f2982b2cd601f3a24ca29ac090304c488df2df105241a7da3973bdc2ca |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\_ssl.pyd
| MD5 | fd0f4aed22736098dc146936cbf0ad1d |
| SHA1 | e520def83b8efdbca9dd4b384a15880b036ee0cf |
| SHA256 | 50404a6a3de89497e9a1a03ff3df65c6028125586dced1a006d2abb9009a9892 |
| SHA512 | c8f3c04d87da19041f28e1d474c8eb052fe8c03ffd88f0681ef4a2ffe29755cfd5b9c100a1b1d2fdb233cb0f70e367af500cbd3cd4ce77475f441f2b2aa0ab8a |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\_sqlite3.pyd
| MD5 | d9eeeeacc3a586cf2dbf6df366f6029e |
| SHA1 | 4ff9fb2842a13e9371ce7894ec4fe331b6af9219 |
| SHA256 | 67649e1e8acd348834efb2c927ab6a7599cf76b2c0c0a50b137b3be89c482e29 |
| SHA512 | 0b9f1d80fb92c796682dba94a75fbce0e4fbeaedccd50e21d42d4b9366463a830109a8cd4300aa62b41910655f8ca96ecc609ea8a1b84236250b6fd08c965830 |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\_socket.pyd
| MD5 | 04e7eb0b6861495233247ac5bb33a89a |
| SHA1 | c4d43474e0b378a00845cca044f68e224455612a |
| SHA256 | 7efe25284a4663df9458603bf0988b0f47c7dcf56119e3e853e6bda80831a383 |
| SHA512 | d4ea0484363edf284ac08a1c3356cc3112d410dd80fe5010c1777acf88dbd830e9f668b593e252033d657a3431a79f7b68d09eb071d0c2ceb51632dbe9b8ed97 |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\_queue.pyd
| MD5 | 0614691624f99748ef1d971419bdb80d |
| SHA1 | 39c52450ed7e31e935b5b0e49d03330f2057747d |
| SHA256 | ac7972502144e9e01e53001e8eec3fc9ab063564678b784d024da2036ba7384d |
| SHA512 | 184bc172c7bb8a1fb55c4c23950cbe5e0b5a3c96c1c555ed8476edf79c5c729ed297112ee01b45d771e5c0055d2dc402b566967d1900b5abf683ee8e668c5b26 |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\_overlapped.pyd
| MD5 | 97a40f53a81c39469cc7c8dd00f51b5d |
| SHA1 | 6c3916fe42e7977d8a6b53bfbc5a579abcf22a83 |
| SHA256 | 11879a429c996fee8be891af2bec7d00f966593f1e01ca0a60bd2005feb4176f |
| SHA512 | 02af654ab73b6c8bf15a81c0e9071c8faf064c529b1439a2ab476e1026c860cf7d01472945112d4583e5da8e4c57f1df2700331440be80066dbb6a7e89e1c5af |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\_multiprocessing.pyd
| MD5 | 849b4203c5f9092db9022732d8247c97 |
| SHA1 | ed7bd0d6dcdcfa07f754b98acf44a7cfe5dcb353 |
| SHA256 | 45bfbab1d2373cf7a8af19e5887579b8a306b3ad0c4f57e8f666339177f1f807 |
| SHA512 | cc618b4fc918b423e5dbdcbc45206653133df16bf2125fd53bafef8f7850d2403564cf80f8a5d4abb4a8928ff1262f80f23c633ea109a18556d1871aff81cd39 |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\_lzma.pyd
| MD5 | bfca96ed7647b31dd2919bedebb856b8 |
| SHA1 | 7d802d5788784f8b6bfbb8be491c1f06600737ac |
| SHA256 | 032b1a139adcff84426b6e156f9987b501ad42ecfb18170b10fb54da0157392e |
| SHA512 | 3a2926b79c90c3153c88046d316a081c8ddfb181d5f7c849ea6ae55cb13c6adba3a0434f800c4a30017d2fbab79d459432a2e88487914b54a897c4301c778551 |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\_decimal.pyd
| MD5 | e9501519a447b13dcca19e09140c9e84 |
| SHA1 | 472b1aa072454d065dfe415a05036ffd8804c181 |
| SHA256 | 6b5fe2dea13b84e40b0278d1702aa29e9e2091f9dc09b64bbff5fd419a604c3c |
| SHA512 | ef481e0e4f9b277642652cd090634e1c04702df789e2267a87205e0fe12b00f1de6cdd4fafb51da01efa726606c0b57fcb2ea373533c772983fc4777dc0acc63 |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\_ctypes.pyd
| MD5 | b4c41a4a46e1d08206c109ce547480c7 |
| SHA1 | 9588387007a49ec2304160f27376aedca5bc854d |
| SHA256 | 9925ab71a4d74ce0ccc036034d422782395dd496472bd2d7b6d617f4d6ddc1f9 |
| SHA512 | 30debb8e766b430a57f3f6649eeb04eb0aad75ab50423252585db7e28a974d629eb81844a05f5cb94c1702308d3feda7a7a99cb37458e2acb8e87efc486a1d33 |
C:\Users\Admin\AppData\Local\Temp\_MEI55642\_cffi_backend.cp311-win_amd64.pyd
| MD5 | 0f0f1c4e1d043f212b00473a81c012a3 |
| SHA1 | ff9ff3c257dceefc74551e4e2bacde0faaef5aec |
| SHA256 | fda255664cbf627cb6a9cd327daf4e3eb06f4f0707ed2615e86e2e99b422ad0b |
| SHA512 | fcfa42f417e319bddf721f298587d1b26e6974e5d7589dfe6ddd2b013bc554a53db3725741fbc4941f34079ed8cb96f05934f3c2b933cda6a7e19cda315591a7 |
memory/5708-516-0x00007FFC6A620000-0x00007FFC6A639000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\_MEI55642\_bz2.pyd
| MD5 | 80c69a1d87f0c82d6c4268e5a8213b78 |
| SHA1 | bae059da91d48eaac4f1bb45ca6feee2c89a2c06 |
| SHA256 | 307359f1b2552b60839385eb63d74cbfe75cd5efdb4e7cd0bb7d296fa67d8a87 |
| SHA512 | 542cf4ba19dd6a91690340779873e0cb8864b28159f55917f98a192ff9c449aba2d617e9b2b3932ddfeee13021706577ab164e5394e0513fe4087af6bc39d40d |
memory/6052-497-0x00007FFC67940000-0x00007FFC67954000-memory.dmp
memory/6052-495-0x00007FFC67960000-0x00007FFC67972000-memory.dmp
memory/6052-478-0x00007FFC67980000-0x00007FFC67995000-memory.dmp
memory/5708-477-0x00007FFC68CF0000-0x00007FFC692D8000-memory.dmp
memory/5708-476-0x00007FFC67E50000-0x00007FFC67E65000-memory.dmp
memory/5868-475-0x00007FFC6A660000-0x00007FFC6A697000-memory.dmp
memory/5708-474-0x00007FFC679A0000-0x00007FFC679BB000-memory.dmp
memory/5708-472-0x00007FFC67D90000-0x00007FFC67DB2000-memory.dmp
memory/5708-471-0x00007FFC67DC0000-0x00007FFC67DD4000-memory.dmp
memory/5708-470-0x00007FFC67DE0000-0x00007FFC67DF4000-memory.dmp
memory/6052-469-0x00007FFC679C0000-0x00007FFC67A78000-memory.dmp
memory/6052-468-0x00007FFC66C90000-0x00007FFC67005000-memory.dmp
memory/5708-466-0x00007FFC67E30000-0x00007FFC67E42000-memory.dmp
memory/6052-465-0x00007FFC67A80000-0x00007FFC67BF3000-memory.dmp
memory/6052-464-0x00007FFC680D0000-0x00007FFC680E9000-memory.dmp
memory/6052-463-0x00007FFC68700000-0x00007FFC68CE8000-memory.dmp
memory/6052-461-0x00007FFC67E70000-0x00007FFC67E93000-memory.dmp
memory/6052-460-0x00007FFC67EA0000-0x00007FFC67ECD000-memory.dmp
memory/6052-459-0x00007FFC67ED0000-0x00007FFC67EE9000-memory.dmp
memory/6052-458-0x00007FFC6CEC0000-0x00007FFC6CECD000-memory.dmp
memory/6052-457-0x00007FFC6EE70000-0x00007FFC6EE7F000-memory.dmp
memory/5708-456-0x00007FFC67EF0000-0x00007FFC67FA8000-memory.dmp
memory/5708-455-0x00007FFC680F0000-0x00007FFC68465000-memory.dmp
memory/6052-454-0x00007FFC68470000-0x00007FFC68494000-memory.dmp
memory/5868-453-0x00007FFC692E0000-0x00007FFC69A6A000-memory.dmp
memory/5708-447-0x00007FFC6A620000-0x00007FFC6A639000-memory.dmp
memory/5868-446-0x00007FFC6A700000-0x00007FFC6A74D000-memory.dmp
memory/5868-444-0x00007FFC6A770000-0x00007FFC6A786000-memory.dmp
memory/5708-443-0x00007FFC75220000-0x00007FFC7522F000-memory.dmp
memory/6052-442-0x00007FFC68700000-0x00007FFC68CE8000-memory.dmp
memory/5868-392-0x00007FFC6A8D0000-0x00007FFC6A8F2000-memory.dmp
memory/5868-327-0x00007FFC6A660000-0x00007FFC6A697000-memory.dmp
memory/5868-318-0x00007FFC6A700000-0x00007FFC6A74D000-memory.dmp
memory/5868-317-0x00007FFC69EB0000-0x00007FFC6A023000-memory.dmp
memory/5868-316-0x00007FFC6AC10000-0x00007FFC6AC33000-memory.dmp
memory/5868-314-0x00007FFC6A770000-0x00007FFC6A786000-memory.dmp
memory/5868-313-0x00007FFC6ADC0000-0x00007FFC6ADD9000-memory.dmp
memory/5868-311-0x00007FFC6A7B0000-0x00007FFC6A8CC000-memory.dmp
memory/5868-309-0x00007FFC6ADE0000-0x00007FFC6AE04000-memory.dmp
memory/5868-307-0x00007FFC6ABC0000-0x00007FFC6ABD5000-memory.dmp
memory/5868-306-0x00007FFC6A960000-0x00007FFC6A974000-memory.dmp
memory/5868-305-0x00007FFC6A980000-0x00007FFC6A994000-memory.dmp
memory/5868-304-0x00007FFC6ABA0000-0x00007FFC6ABB2000-memory.dmp
memory/5868-302-0x00007FFC69A70000-0x00007FFC69DE5000-memory.dmp
memory/5868-297-0x00000170714B0000-0x0000017071825000-memory.dmp
memory/5868-295-0x00007FFC6A030000-0x00007FFC6A618000-memory.dmp
memory/5868-291-0x00007FFC6ABE0000-0x00007FFC6AC0E000-memory.dmp
memory/5868-287-0x00007FFC6AC10000-0x00007FFC6AC33000-memory.dmp
memory/5868-284-0x00007FFC7D740000-0x00007FFC7D74D000-memory.dmp
memory/5868-282-0x00007FFC6ADA0000-0x00007FFC6ADB9000-memory.dmp
memory/5868-281-0x00007FFC6ADC0000-0x00007FFC6ADD9000-memory.dmp
memory/5868-256-0x00007FFC6ADE0000-0x00007FFC6AE04000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_u10yit1l.13v.ps1
| MD5 | d17fe0a3f47be24a6453e9ef58c94641 |
| SHA1 | 6ab83620379fc69f80c0242105ddffd7d98d5d9d |
| SHA256 | 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7 |
| SHA512 | 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports
| MD5 | d751713988987e9331980363e24189ce |
| SHA1 | 97d170e1550eee4afc0af065b78cda302a97674c |
| SHA256 | 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945 |
| SHA512 | b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af |
C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Desktop\BackupAssert.odt
| MD5 | 818f4706857325f03a38f983bfb7761d |
| SHA1 | 579620e058fb4c736d3fcc49971d420e148380e7 |
| SHA256 | c6804257d01d63ba19b28011432266cc7fbe9b92005f797cd56f436834ed0303 |
| SHA512 | 11402033889074d276959dd7bef1ab81255b7fa5b7866aa436238d759e7a02c8318dc712435e03dbfd29522d1b9445bda20203d816e3340d3ec55765d7fad056 |
C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Desktop\WriteClear.zip
| MD5 | 479ce4d08c8760bf80844f7e6b91f3b8 |
| SHA1 | 2ba5b3417d6c26d0821c67442f7b4d83eadc2944 |
| SHA256 | 2cf05e5971eb86915a234f72730a83ddf0cb38e44cf612d44f4c19a5b0160f03 |
| SHA512 | ad1ac661fa4bee1b36eeba5d50cdad374b9729bb84fbf4357f602a992edcf56394e6b361d02ae1d09e606486b41e7dd53d1640507782218c06d9e2d6ee4bd6fe |
C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Desktop\ResolveAdd.docx
| MD5 | 649e0449bceb53c1720a1230fdb59fc2 |
| SHA1 | 50b38440b4c0bcfd242a52f3c71317fd559df0ff |
| SHA256 | 24361de3654a2ddb39d042f958815e2637f82a2cbc39b3d3d333cdc4f645576c |
| SHA512 | 4a56975e2efe7244d362f2df220c394b1ef5847c6e26050336de6f81bd64a5efed59524a10bdfef5fa2b6cf93f723ac4ccda0984d432ca8678ed0647057edf68 |
C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Desktop\RepairBackup.mp2v
| MD5 | ec6ada278b4b0449bfe3080ab43ba999 |
| SHA1 | ae9856ba3c9b68ce984bf8ba0ec56a53511b2aaa |
| SHA256 | f18e16022937d50f19c2e748d660e67f0efaedd177b898e1c9a073201f957d6a |
| SHA512 | 7115de8211881962ac475ecbe34f60bd5f0652eb0e1084443dadec8a04da94719408a4b77fcac2ab8e4554697a86512ca7f82f3e0cceae4b19b87fcb9fb0f48b |
C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Documents\ConfirmDebug.xlsx
| MD5 | 72adc3bdde588a3a8cb316066c8f01ba |
| SHA1 | 27ebb1883da50050d6871e9b0a0f90680311793e |
| SHA256 | 084ca8e5771657d22c1e26a611f44bb07b6308a238b94bc29014258f6f2929c0 |
| SHA512 | 3a6aac40a28b4d5ee01d8edd9f9281711f2b7f23d0f82a4c077356173b7dac5f7cdde2d5208841331f89a1dd06a0026677d74237f29d902e5e9d756ed475f406 |
C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Documents\CompleteImport.xlsx
| MD5 | 7f884a65ae1c98dacffb62516b221117 |
| SHA1 | f53df2c9906f3620faad36a773fad0b577c8e415 |
| SHA256 | 144527eb6924ddd0e51326f725790f1066be1ac3c9e1d6eaf890c9d93675614c |
| SHA512 | 29bf6caca836beb17c83b24721afea2c36eb861a05bc0d3b9ff835ab9d204b2fdf323018faf7911f14b86bb754547547faf7441aafc9ea12fc7348de4c15125b |
C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Documents\WatchRedo.csv
| MD5 | cf3b63666813c19b3cc005ef0fe60289 |
| SHA1 | 226329c6857f6b88df2b83b545bec761cb538a4e |
| SHA256 | 633bc6480cbe5841893d82f5505383facf1a4eb5a847b43a0c8a26a8980b962b |
| SHA512 | 96b97fd9be54434fe5f0f6971f884538186481a8c81454f515170d638aebd7332f6b3365ce3844742346ce57b6adc0d67deae59c15661aabc272597746b3ece5 |
C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Documents\SearchCompare.docx
| MD5 | b4e7691b4608d7db74746cd6425371da |
| SHA1 | 4f07dcbbbf0a2c81796f5e304da2145b0ff2ba73 |
| SHA256 | a63c1345bba42e13672a33a6f16a752b4308186aabeaa866b5745fb55bc9abc4 |
| SHA512 | 7edc978e3bfa9b09d6e693533a0610c7428f55fc7ad7dabf9950e577be71b4223f29e58048989d96a681786aeecb1d04d38b318f8a7b855d3d0fd394f9dd8272 |
C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Downloads\CloseLimit.mp3
| MD5 | 3ab19ac3e91ae6bebfee5a67ab16d13a |
| SHA1 | 55dc570c5603ed0b5894d2d556333a5c9e602cf0 |
| SHA256 | bdce008831b9f0027c96b22aca3359399077ad2c1dc095a5722f8176688020b6 |
| SHA512 | 009966378cebb39b4b2e8c90f97c2baa299e6b90c91dcd69402ffda3d1ee5a87c54f30aa2ff2a63f989db38bc81fa0ce3d89daa444eb59ab792b67a1d55295fd |
C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Downloads\PushStep.jpg
| MD5 | 96e4c00ac31f8d2864cc7f3230b3dbc4 |
| SHA1 | 26c3a9dce8947fd371ad606d09341763609e4a0d |
| SHA256 | 7ff69c8cf3e73d118d8029e7bdb3ffa112ea9979efd626654b19b499c5fe5ff2 |
| SHA512 | e067a44cf53a8c74bff480ee39894e7539be74d5011cee122111455cfe148221e7568d09f12467d6c787812592c29edcc4edf9ffc80940464b55276b44a82578 |
C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Downloads\ReadPing.zip
| MD5 | a7598844a4ecf8dac4390a8d9bfc8b24 |
| SHA1 | fe1265b5df36d9114e38ef4e4ff3644ccf707fba |
| SHA256 | edb3f7286482fd248cee7927edcaa04271f1e3f69ad5c6ac07e721b798e9451d |
| SHA512 | 1b7c28f975536a677735a6ce0712cb6f177210fd15f3e38b0f3263ab59a8b0efa6abc26bb73614af0a949220092e441cfd7e71cc998eaef8958dd746f0e8341a |
C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Downloads\RegisterLock.mp3
| MD5 | 0fdc61fc43a3e329195bb06bc9496840 |
| SHA1 | 867ae4c6eb0b7c0641ecf6ad10d98ee7d44ab456 |
| SHA256 | 74bda739de2e5c22cfa58ddc740693b20b07575a096d6263e1febc065076ca29 |
| SHA512 | cf3d9f9502ac89bcefb122b8cd4c23f02ccb667e019d90bbe662e5513b0e4319c9304449a5f5bce849571f0434fa54b780f59fa5d916649b9fdaed90ce1a80c8 |
C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Music\RemoveBackup.sql
| MD5 | ac18db499ee3138608f04f20667b49ca |
| SHA1 | 0b7e28bd2b0afa2ae186a6dc57aee7c9fc0c14e3 |
| SHA256 | bbabe9f57fc9d7136e6c578fbd6b7bb3d3e99e05cb189fcccc705bf9eab40d4c |
| SHA512 | 57f351cdc4ff09d555f48bfba3542cdeb9f7d1a4fa9ab8d723ffc7c363a07a5b55e53addbf4148e125a025866d2fadfb2996afd46099ae38743a9aebf55c583b |
C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Pictures\BlockSuspend.jpg
| MD5 | c0a7639f1412186c5e7808ae285f0361 |
| SHA1 | 95517e8822dd6e46c79ed2ea48416f99101d7e92 |
| SHA256 | 1a4f3bd938bd2c01989602afb6a86efadf607933c4d238c8ec8408d7a343ff75 |
| SHA512 | 5ed8604d24efceaf254e15d3482592080a0a396dc970e7f5e2a29369d032c433d91bac1c9e17a20cbe516052aeed2f110205fb512816452b682916f08138a3b4 |
C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Pictures\DisablePing.jpeg
| MD5 | 3b50090219c03e36ef03c63f81f08aa0 |
| SHA1 | 22403f9466e6efa5bcff320c3c63849ff32128b5 |
| SHA256 | 0d4d2627221cc41309f9dccde55a2039e5230e94611d8a33870e027e49cf4cf5 |
| SHA512 | c369a9566f0fac740959043126565f73e4db68fbd0d56902bba198fe17d20cede24b378c901ddbc231d03363f80c5bcc3831970de6148a1efdafd8300300ab28 |
C:\Users\Admin\AppData\Local\Temp\StealedFilesByExela\Pictures\My Wallpaper.jpg
| MD5 | a51464e41d75b2aa2b00ca31ea2ce7eb |
| SHA1 | 5b94362ac6a23c5aba706e8bfd11a5d8bab6097d |
| SHA256 | 16d5506b6663085b1acd80644ffa5363c158e390da67ed31298b85ddf0ad353f |
| SHA512 | b2a09d52c211e7100e3e68d88c13394c64f23bf2ec3ca25b109ffb1e1a96a054f0e0d25d2f2a0c2145616eabc88c51d63023cef5faa7b49129d020f67ab0b1ff |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState
| MD5 | e301f325812504e82dee42732748b70c |
| SHA1 | 97bc6afd4b84d8f6c661ac1f495a719a8dbd4cc7 |
| SHA256 | 185e00c187f54d969c83054333ece92d4b1878575d129d993ef4a86e52150e46 |
| SHA512 | 65132ea434a36d70eb1d2f70594761fe78f76106afcfe8749e7ccf2d99b0a53e3e863cba8524cb26fbb837ead6c22d79b8b457c6a73a4b775c2d6fc3371f5301 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
| MD5 | 6312e65978b822e4ec8b2c3dc7849f23 |
| SHA1 | f73ee2c520d2fe7336172e3da94361911050acb6 |
| SHA256 | 6f7422c5ae1455a60d2b1534b81fee2ef53528ea019cbbd04978d472d30fde14 |
| SHA512 | 92e8b6a3960aa175955aa2f2c98c21e3da14cf0a1835b8e5e4afd247f991e0938be12deb7e1c67addb65f9e7d450c3ddc4af8d91183275f6c6f53c843ce6a805 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | bb94c1351886b91a5782a7a1665fc6c5 |
| SHA1 | f880abec9aba50195d2880ca6e2aa4ecbaf2a39e |
| SHA256 | 09dbae536ce841361bd34ce881ab946af22324fda0799f9c91c3593c8070482d |
| SHA512 | 1970af107924e7a112d5daebb80098b3f5a43ff9ecdd080a77004e29014e079981936f1cb5e0259d7018754ee1952aeb849b0521584bda87cb678d6d56dba4cb |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity
| MD5 | 690f8a40a2cac49399d6e5b867bea65d |
| SHA1 | 2f5d832fe31572468c81aea1cd92c4410f8d79f5 |
| SHA256 | 4ae5b702c1a36f0ab75afdb4275daa7398a1f423b161a8a53c5a69a51703b255 |
| SHA512 | 736130d1b97a9a189dfa5078ad2d0cfd90d74371276bd0f97ed4e0eaceb7e957177756c8c4d4adde605e3d4555081c9fc11f9d20359d168b92a0a04fe968b7c8 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences
| MD5 | 56c0f24e93dd4c9d9795be4fcfb0f259 |
| SHA1 | f1c2588c720ae9bdfbb2570899935b6b9aa85564 |
| SHA256 | 901b1c043894fd7a3e26612e4ef439d1e324d2c615bfb3817f065bf96a0c11ed |
| SHA512 | 8feaef2000a43a259dffa97c5f126063d889cf01de892f2b44c0c9d963ac1a221572752bf4dd3aa1542fc2ada6b9b2e46340c23b787e795d709f517413212dda |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 33c736647b3355b11b34afecd49f910c |
| SHA1 | 058f992b47e7c5f3fbd25a836383ad87e18dec16 |
| SHA256 | e848f313b7a712d2c6143ed59f93ca03f753c5dc7252feb7b63de991dc75029e |
| SHA512 | 40dfd354ecb2165f22655cb7230e58f0c0f0c8343368c1af8d91690d6e68e01b9c1fe255a493ed2291b41831117777914370ad4ad40c983b5fb1e5f8a88e1594 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | f7efc6992499d246d2a5aeec7fd72d0d |
| SHA1 | 7f5cfb0fdf9a6842002fd99c180fd89037f6909c |
| SHA256 | 49878b6da135f7e56923f9df275b0caa9b90dc8af6118137db403f416103bcca |
| SHA512 | aeb70df17783d3a5bdbae1cc479f36b9059534cf5ede571fea614bcea832a984b417af065e60e3d886dcf16a2c593acc148d259a08dd5750df2a8046b6d1c2ce |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c1cb8112-167b-4d39-ad38-051271ed3c54.tmp
| MD5 | 5058f1af8388633f609cadb75a75dc9d |
| SHA1 | 3a52ce780950d4d969792a2559cd519d7ee8c727 |
| SHA256 | cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8 |
| SHA512 | 0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | cb42c0d3bddf3aac44fd46a10df8b3cf |
| SHA1 | d40069a50ca228eb7dd3775f771b315de66bee9b |
| SHA256 | 966c98b4aa83ee6d63e9af5bd17be7f60eec83c12bd91911e7a9eacfbf2ef3d2 |
| SHA512 | bdd5f2157933eba25f872ede46d4a552466c86c1155558555f17c015a32921169f50af78c6d492b26b826124ed905e35479d34404f7d199075ac6139f8e5ddc8 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\b0f23cab-238b-4d65-af43-f01e8f0d6163.tmp
| MD5 | 9d25639d79ec6c855f153777aec62ce6 |
| SHA1 | 0acd6fd00e819cbd72eacafa29b487a91acbea5f |
| SHA256 | 601eaf22aafa4538d47e62ee6b33ac21d55408f447941db8cdf31bb8e9663256 |
| SHA512 | ec4414149d8563126d7d67f4f4ff1de921cbdf32b92eac010b82dac2890faad5c8ff4e35d79fa3b33c4e7f305966a33e3dac21798e00571e7b8cfe4fe20e99f0 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | aefd77f47fb84fae5ea194496b44c67a |
| SHA1 | dcfbb6a5b8d05662c4858664f81693bb7f803b82 |
| SHA256 | 4166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611 |
| SHA512 | b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 99f6a49dfb0833c4f6aa82f266f5939b |
| SHA1 | b77f04dc663752aa81fff3f764ff89b224beaabb |
| SHA256 | 82c5200e904e88ccc5017fad4fa8aded52961561b3de4391b0deae9fa2a88ab7 |
| SHA512 | 6f56c69d43bef2944752fb2555024a285afb266869fe96f1ea26157f3f71e47ffa05662501a6c2e624f5a53be4452f333d4c8464e170cda4ab76e1bc80d7ab70 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State
| MD5 | 6460b4ac5ce310132034130333a5cf9f |
| SHA1 | 69567cdafe3191f725bc6af696feddc8cf136cc4 |
| SHA256 | 72bf434f581232ccb121c34f164f8a4cc4becf0f1de618674b2422dbf6415ac9 |
| SHA512 | a063e8a2c07b1443842116840443547e1a213887cc903a3796eeefd3609cad1c2d4e4aa024663dbd2c2d54bbb743073ca794d616b583a364003290d693547304 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences
| MD5 | c631d05f13c6ad4686855475344a9597 |
| SHA1 | f976d4da2ef03dc6f2aa3957d4ddb4f32fbb49df |
| SHA256 | d143a8afca6552316c252fe6793d21d1313ea927725e0bcfe3f670f69a4caff8 |
| SHA512 | e56eab4d56aa68634bb919af2be6f796b335159e60effa7369e88dd86890b3d7fd180a7a25c7d65bba3e7b8531406e1b4a8ed4d427757033f1352b854729aa25 |
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State
| MD5 | a4977f116441c67dba17eba82b7f32dd |
| SHA1 | 092131918bc2a2fe065d2071ac7ccfa17a953355 |
| SHA256 | d127f1cd1019520e8b1194600181c52982726e1701b612a08bb77719208826d7 |
| SHA512 | dea71e5d8ad5bd665162fe31febfe6ad9eb28e395255d52f5d847b03124a1870d3d7ec300efc22acd7286c902ee7916eb18d23f9bb73a29cf1d5e3ff003d7a1f |
C:\Users\Admin\AppData\Local\Temp\Web.db
| MD5 | f70aa3fa04f0536280f872ad17973c3d |
| SHA1 | 50a7b889329a92de1b272d0ecf5fce87395d3123 |
| SHA256 | 8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8 |
| SHA512 | 30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84 |
C:\Users\Admin\AppData\Local\Temp\Web.db
| MD5 | f1b0d67d9700b657fffb1e53c14444ae |
| SHA1 | ae8a3a681da72d78263510a2e6a2ad5a66cb0164 |
| SHA256 | 7a26e63a529f6c2ceb6063b72e61caae2a643152c7b1b75b3396a700aac95bc1 |
| SHA512 | a2b3ab1807a517b1b499df7d8cbd7b695918113f4124b60ab54b6fa1b2fee6d0813c73202ceec42c7b9fc2c124e0555ecff62acb948cf0ddc19b51607f527b50 |
C:\Users\Admin\AppData\Local\Temp\HistoryData.db
| MD5 | f310cf1ff562ae14449e0167a3e1fe46 |
| SHA1 | 85c58afa9049467031c6c2b17f5c12ca73bb2788 |
| SHA256 | e187946249cd390a3c1cf5d4e3b0d8f554f9acdc416bf4e7111fff217bb08855 |
| SHA512 | 1196371de08c964268c44103ccaed530bda6a145df98e0f480d8ee5ad58cb6fb33ca4c9195a52181fe864726dcf52e6a7a466d693af0cda43400a3a7ef125fad |