Analysis

  • max time kernel
    137s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-12-2024 11:42

General

Malware Config

Extracted

Family

xworm

C2

group-mesa.gl.at.ply.gg:1488

Attributes
  • Install_directory

    %LocalAppData%

  • install_file

    svchost.exe

Signatures

  • Detect Xworm Payload 2 IoCs
  • Exela Stealer

    Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

  • Exelastealer family
  • Xworm

    Xworm is a remote access trojan written in C#.

  • Xworm family
  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Downloads MZ/PE file
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 2 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Clipboard Data 1 TTPs 2 IoCs

    Adversaries may collect data stored in the clipboard from users copying information within or between applications.

  • Drops startup file 2 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 20 IoCs
  • Loads dropped DLL 49 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Service Discovery 1 TTPs 2 IoCs

    Attempt to gather information on host's network.

  • Checks system information in the registry 2 TTPs 8 IoCs

    System information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Permission Groups Discovery: Local Groups 1 TTPs

    Attempt to find local system groups and permission settings.

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • System Network Connections Discovery 1 TTPs 1 IoCs

    Attempt to get a listing of network connections.

  • Checks processor information in registry 2 TTPs 12 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Collects information from the system 1 TTPs 1 IoCs

    Uses WMIC.exe to find detailed system information.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Modifies data under HKEY_USERS 41 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "https://workupload.com/file/Un45ur8sMTg"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:548
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url https://workupload.com/file/Un45ur8sMTg
      2⤵
      • Checks processor information in registry
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4924
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2016 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1812 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f8c7d4a7-c20e-44dc-8ff1-4034520c4e24} 4924 "\\.\pipe\gecko-crash-server-pipe.4924" gpu
        3⤵
          PID:2540
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2332 -parentBuildID 20240401114208 -prefsHandle 2464 -prefMapHandle 2460 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5ede6c8f-9309-4bcb-885d-2e68d3f64569} 4924 "\\.\pipe\gecko-crash-server-pipe.4924" socket
          3⤵
          • Checks processor information in registry
          PID:4392
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3400 -childID 1 -isForBrowser -prefsHandle 3140 -prefMapHandle 3380 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a1e23b2f-9b9d-40b4-b869-b225fc4b4974} 4924 "\\.\pipe\gecko-crash-server-pipe.4924" tab
          3⤵
            PID:3132
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3868 -childID 2 -isForBrowser -prefsHandle 3860 -prefMapHandle 3856 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d4ded85a-edae-4df6-8ff9-351da921bed8} 4924 "\\.\pipe\gecko-crash-server-pipe.4924" tab
            3⤵
              PID:1280
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4444 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4544 -prefMapHandle 4524 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d74616c-c955-4e81-a241-66ee102dd95e} 4924 "\\.\pipe\gecko-crash-server-pipe.4924" utility
              3⤵
              • Checks processor information in registry
              PID:4312
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5432 -childID 3 -isForBrowser -prefsHandle 5396 -prefMapHandle 5400 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e50fb125-51e2-4cfb-8e58-253651e64054} 4924 "\\.\pipe\gecko-crash-server-pipe.4924" tab
              3⤵
                PID:748
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5384 -childID 4 -isForBrowser -prefsHandle 5556 -prefMapHandle 5560 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0c7938e5-aa94-40e9-b163-4b133b5c64f0} 4924 "\\.\pipe\gecko-crash-server-pipe.4924" tab
                3⤵
                  PID:5116
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5724 -childID 5 -isForBrowser -prefsHandle 5760 -prefMapHandle 5764 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0ca38610-c524-4102-af96-29bb1a710402} 4924 "\\.\pipe\gecko-crash-server-pipe.4924" tab
                  3⤵
                    PID:4516
              • C:\Windows\System32\rundll32.exe
                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                1⤵
                  PID:3888
                • C:\Program Files\7-Zip\7zFM.exe
                  "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\Downloads\Nursultan crack.rar"
                  1⤵
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  PID:2904
                • C:\Windows\system32\mspaint.exe
                  "C:\Windows\system32\mspaint.exe"
                  1⤵
                  • Drops file in Windows directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SetWindowsHookEx
                  PID:1148
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService
                  1⤵
                    PID:3244
                  • C:\Users\Admin\Desktop\New folder\nurik.exe
                    "C:\Users\Admin\Desktop\New folder\nurik.exe"
                    1⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    PID:2616
                    • C:\Users\Admin\AppData\Local\Temp\XClientik.exe
                      "C:\Users\Admin\AppData\Local\Temp\XClientik.exe"
                      2⤵
                      • Checks computer location settings
                      • Drops startup file
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of SetWindowsHookEx
                      PID:1436
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\XClientik.exe'
                        3⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:1636
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClientik.exe'
                        3⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3820
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\svchost.exe'
                        3⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4568
                      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'svchost.exe'
                        3⤵
                        • Command and Scripting Interpreter: PowerShell
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:3188
                    • C:\Users\Admin\AppData\Local\Temp\Exela.exe
                      "C:\Users\Admin\AppData\Local\Temp\Exela.exe"
                      2⤵
                      • Executes dropped EXE
                      PID:4284
                      • C:\Users\Admin\AppData\Local\Temp\Exela.exe
                        "C:\Users\Admin\AppData\Local\Temp\Exela.exe"
                        3⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        PID:4608
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c "ver"
                          4⤵
                            PID:1592
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                            4⤵
                              PID:752
                              • C:\Windows\System32\Wbem\WMIC.exe
                                wmic csproduct get uuid
                                5⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:644
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c "tasklist"
                              4⤵
                                PID:736
                                • C:\Windows\system32\tasklist.exe
                                  tasklist
                                  5⤵
                                  • Enumerates processes with tasklist
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:1724
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe""
                                4⤵
                                • Hide Artifacts: Hidden Files and Directories
                                PID:4844
                                • C:\Windows\system32\attrib.exe
                                  attrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe"
                                  5⤵
                                  • Views/modifies file attributes
                                  PID:2540
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c "tasklist"
                                4⤵
                                  PID:1144
                                  • C:\Windows\system32\tasklist.exe
                                    tasklist
                                    5⤵
                                    • Enumerates processes with tasklist
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4272
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
                                  4⤵
                                    PID:2340
                                    • C:\Windows\system32\cmd.exe
                                      cmd.exe /c chcp
                                      5⤵
                                        PID:5044
                                        • C:\Windows\system32\chcp.com
                                          chcp
                                          6⤵
                                            PID:4204
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
                                        4⤵
                                          PID:932
                                          • C:\Windows\system32\cmd.exe
                                            cmd.exe /c chcp
                                            5⤵
                                              PID:2292
                                              • C:\Windows\system32\chcp.com
                                                chcp
                                                6⤵
                                                  PID:3732
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                              4⤵
                                                PID:1112
                                                • C:\Windows\system32\tasklist.exe
                                                  tasklist /FO LIST
                                                  5⤵
                                                  • Enumerates processes with tasklist
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3984
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"
                                                4⤵
                                                • Clipboard Data
                                                PID:1592
                                                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                  powershell.exe Get-Clipboard
                                                  5⤵
                                                  • Clipboard Data
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:1456
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"
                                                4⤵
                                                • Network Service Discovery
                                                PID:3912
                                                • C:\Windows\system32\systeminfo.exe
                                                  systeminfo
                                                  5⤵
                                                  • Gathers system information
                                                  PID:3220
                                                • C:\Windows\system32\HOSTNAME.EXE
                                                  hostname
                                                  5⤵
                                                    PID:2796
                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                    wmic logicaldisk get caption,description,providername
                                                    5⤵
                                                    • Collects information from the system
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:452
                                                  • C:\Windows\system32\net.exe
                                                    net user
                                                    5⤵
                                                      PID:3316
                                                      • C:\Windows\system32\net1.exe
                                                        C:\Windows\system32\net1 user
                                                        6⤵
                                                          PID:3492
                                                      • C:\Windows\system32\query.exe
                                                        query user
                                                        5⤵
                                                          PID:1456
                                                          • C:\Windows\system32\quser.exe
                                                            "C:\Windows\system32\quser.exe"
                                                            6⤵
                                                              PID:5000
                                                          • C:\Windows\system32\net.exe
                                                            net localgroup
                                                            5⤵
                                                              PID:3272
                                                              • C:\Windows\system32\net1.exe
                                                                C:\Windows\system32\net1 localgroup
                                                                6⤵
                                                                  PID:112
                                                              • C:\Windows\system32\net.exe
                                                                net localgroup administrators
                                                                5⤵
                                                                  PID:1348
                                                                  • C:\Windows\system32\net1.exe
                                                                    C:\Windows\system32\net1 localgroup administrators
                                                                    6⤵
                                                                      PID:3944
                                                                  • C:\Windows\system32\net.exe
                                                                    net user guest
                                                                    5⤵
                                                                      PID:1660
                                                                      • C:\Windows\system32\net1.exe
                                                                        C:\Windows\system32\net1 user guest
                                                                        6⤵
                                                                          PID:2804
                                                                      • C:\Windows\system32\net.exe
                                                                        net user administrator
                                                                        5⤵
                                                                          PID:3412
                                                                          • C:\Windows\system32\net1.exe
                                                                            C:\Windows\system32\net1 user administrator
                                                                            6⤵
                                                                              PID:2680
                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                            wmic startup get caption,command
                                                                            5⤵
                                                                              PID:4844
                                                                            • C:\Windows\system32\tasklist.exe
                                                                              tasklist /svc
                                                                              5⤵
                                                                              • Enumerates processes with tasklist
                                                                              PID:4812
                                                                            • C:\Windows\system32\ipconfig.exe
                                                                              ipconfig /all
                                                                              5⤵
                                                                              • Gathers network information
                                                                              PID:3760
                                                                            • C:\Windows\system32\ROUTE.EXE
                                                                              route print
                                                                              5⤵
                                                                                PID:1564
                                                                              • C:\Windows\system32\ARP.EXE
                                                                                arp -a
                                                                                5⤵
                                                                                • Network Service Discovery
                                                                                PID:2020
                                                                              • C:\Windows\system32\NETSTAT.EXE
                                                                                netstat -ano
                                                                                5⤵
                                                                                • System Network Connections Discovery
                                                                                • Gathers network information
                                                                                PID:848
                                                                              • C:\Windows\system32\sc.exe
                                                                                sc query type= service state= all
                                                                                5⤵
                                                                                • Launches sc.exe
                                                                                PID:4072
                                                                              • C:\Windows\system32\netsh.exe
                                                                                netsh firewall show state
                                                                                5⤵
                                                                                • Modifies Windows Firewall
                                                                                • Event Triggered Execution: Netsh Helper DLL
                                                                                PID:2036
                                                                              • C:\Windows\system32\netsh.exe
                                                                                netsh firewall show config
                                                                                5⤵
                                                                                • Modifies Windows Firewall
                                                                                • Event Triggered Execution: Netsh Helper DLL
                                                                                PID:1144
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"
                                                                              4⤵
                                                                              • System Network Configuration Discovery: Wi-Fi Discovery
                                                                              PID:2680
                                                                              • C:\Windows\system32\netsh.exe
                                                                                netsh wlan show profiles
                                                                                5⤵
                                                                                • Event Triggered Execution: Netsh Helper DLL
                                                                                • System Network Configuration Discovery: Wi-Fi Discovery
                                                                                PID:1272
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                              4⤵
                                                                                PID:4012
                                                                                • C:\Windows\System32\Conhost.exe
                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  5⤵
                                                                                    PID:452
                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                    wmic csproduct get uuid
                                                                                    5⤵
                                                                                      PID:1592
                                                                                  • C:\Windows\system32\cmd.exe
                                                                                    C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                    4⤵
                                                                                      PID:1876
                                                                                      • C:\Windows\System32\Wbem\WMIC.exe
                                                                                        wmic csproduct get uuid
                                                                                        5⤵
                                                                                          PID:4288
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Nursultan.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\Nursultan.exe"
                                                                                    2⤵
                                                                                    • Checks computer location settings
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of NtSetInformationThreadHideFromDebugger
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    PID:1976
                                                                                    • C:\Users\Admin\Desktop\New folder\MicrosoftEdgeWebview2Setup.exe
                                                                                      "C:\Users\Admin\Desktop\New folder\MicrosoftEdgeWebview2Setup.exe" /install
                                                                                      3⤵
                                                                                      • Executes dropped EXE
                                                                                      • Drops file in Program Files directory
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      PID:1892
                                                                                      • C:\Program Files (x86)\Microsoft\Temp\EUA18.tmp\MicrosoftEdgeUpdate.exe
                                                                                        "C:\Program Files (x86)\Microsoft\Temp\EUA18.tmp\MicrosoftEdgeUpdate.exe" /install "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers"
                                                                                        4⤵
                                                                                        • Event Triggered Execution: Image File Execution Options Injection
                                                                                        • Checks computer location settings
                                                                                        • Executes dropped EXE
                                                                                        • Loads dropped DLL
                                                                                        • Checks system information in the registry
                                                                                        • System Location Discovery: System Language Discovery
                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                        PID:388
                                                                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regsvc
                                                                                          5⤵
                                                                                          • Executes dropped EXE
                                                                                          • Loads dropped DLL
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Modifies registry class
                                                                                          PID:3272
                                                                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /regserver
                                                                                          5⤵
                                                                                          • Executes dropped EXE
                                                                                          • Loads dropped DLL
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • Modifies registry class
                                                                                          PID:3912
                                                                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.39\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.39\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                                                            6⤵
                                                                                            • Executes dropped EXE
                                                                                            • Loads dropped DLL
                                                                                            • Modifies registry class
                                                                                            PID:4776
                                                                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.39\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.39\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                                                            6⤵
                                                                                            • Executes dropped EXE
                                                                                            • Loads dropped DLL
                                                                                            • Modifies registry class
                                                                                            PID:3668
                                                                                          • C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.39\MicrosoftEdgeUpdateComRegisterShell64.exe
                                                                                            "C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.195.39\MicrosoftEdgeUpdateComRegisterShell64.exe"
                                                                                            6⤵
                                                                                            • Executes dropped EXE
                                                                                            • Loads dropped DLL
                                                                                            • Modifies registry class
                                                                                            PID:1600
                                                                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping PD94bWwgdmVyc2lvbj0iMS4wIiBlbmNvZGluZz0iVVRGLTgiPz48cmVxdWVzdCBwcm90b2NvbD0iMy4wIiB1cGRhdGVyPSJPbWFoYSIgdXBkYXRlcnZlcnNpb249IjEuMy4xOTUuMzkiIHNoZWxsX3ZlcnNpb249IjEuMy4xOTUuMzkiIGlzbWFjaGluZT0iMSIgc2Vzc2lvbmlkPSJ7RUI1QjU4OTItNEI3Qy00QzQ2LUE5MjItNzBGMjlBNzc0QjlBfSIgdXNlcmlkPSJ7NEYwRUFENTctMUQzQS00REJFLUIxRjctRTUzN0Q2QjMxRjJGfSIgaW5zdGFsbHNvdXJjZT0ib3RoZXJpbnN0YWxsY21kIiByZXF1ZXN0aWQ9IntDMUJEQzk5MS05OUFGLTQ2M0EtQTUxRS05RTNERDRGNUJERjl9IiBkZWR1cD0iY3IiIGRvbWFpbmpvaW5lZD0iMCI-PGh3IGxvZ2ljYWxfY3B1cz0iOCIgcGh5c21lbW9yeT0iOCIgZGlza190eXBlPSIyIiBzc2U9IjEiIHNzZTI9IjEiIHNzZTM9IjEiIHNzc2UzPSIxIiBzc2U0MT0iMSIgc3NlNDI9IjEiIGF2eD0iMSIvPjxvcyBwbGF0Zm9ybT0id2luIiB2ZXJzaW9uPSIxMC4wLjE5MDQxLjEyODgiIHNwPSIiIGFyY2g9Ing2NCIgcHJvZHVjdF90eXBlPSI0OCIgaXNfd2lwPSIwIiBpc19pbl9sb2NrZG93bl9tb2RlPSIwIi8-PG9lbSBwcm9kdWN0X21hbnVmYWN0dXJlcj0iIiBwcm9kdWN0X25hbWU9IiIvPjxleHAgZXRhZz0iIi8-PGFwcCBhcHBpZD0ie0YzQzRGRTAwLUVGRDUtNDAzQi05NTY5LTM5OEEyMEYxQkE0QX0iIHZlcnNpb249IjEuMy4xNDcuMzciIG5leHR2ZXJzaW9uPSIxLjMuMTk1LjM5IiBsYW5nPSIiIGJyYW5kPSIiIGNsaWVudD0iIj48ZXZlbnQgZXZlbnR0eXBlPSIyIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIwIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1NzI4MTc3NzA4IiBpbnN0YWxsX3RpbWVfbXM9IjU3OCIvPjwvYXBwPjwvcmVxdWVzdD4
                                                                                          5⤵
                                                                                          • Executes dropped EXE
                                                                                          • Loads dropped DLL
                                                                                          • Checks system information in the registry
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          • System Network Configuration Discovery: Internet Connection Discovery
                                                                                          PID:880
                                                                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /handoff "appguid={F3017226-FE2A-4295-8BDF-00C3A9A7E4C5}&appname=Microsoft%20Edge%20Webview2%20Runtime&needsadmin=prefers" /installsource otherinstallcmd /sessionid "{EB5B5892-4B7C-4C46-A922-70F29A774B9A}"
                                                                                          5⤵
                                                                                          • Executes dropped EXE
                                                                                          • Loads dropped DLL
                                                                                          • System Location Discovery: System Language Discovery
                                                                                          PID:4060
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Client.exe
                                                                                    "C:\Users\Admin\AppData\Local\Temp\Client.exe"
                                                                                    2⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:3032
                                                                                • C:\Windows\system32\backgroundTaskHost.exe
                                                                                  "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                                  1⤵
                                                                                    PID:2540
                                                                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                                    "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /svc
                                                                                    1⤵
                                                                                    • Executes dropped EXE
                                                                                    • Loads dropped DLL
                                                                                    • Checks system information in the registry
                                                                                    • System Location Discovery: System Language Discovery
                                                                                    • Modifies data under HKEY_USERS
                                                                                    PID:4952
                                                                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe
                                                                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI3MSIgaW5zdGFsbGRhdGV0aW1lPSIxNzI4MjkzNTMzIiBvb2JlX2luc3RhbGxfdGltZT0iMTMzNzI3NjYxMjM4MDMwMDAwIj48ZXZlbnQgZXZlbnR0eXBlPSIzMSIgZXZlbnRyZXN1bHQ9IjEiIGVycm9yY29kZT0iMCIgZXh0cmFjb2RlMT0iMjE3OTg2MiIgc3lzdGVtX3VwdGltZV90aWNrcz0iNTc0NDQyNzc3NyIvPjwvYXBwPjwvcmVxdWVzdD4
                                                                                      2⤵
                                                                                      • Executes dropped EXE
                                                                                      • Loads dropped DLL
                                                                                      • Checks system information in the registry
                                                                                      • System Location Discovery: System Language Discovery
                                                                                      • System Network Configuration Discovery: Internet Connection Discovery
                                                                                      PID:3732
                                                                                    • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{450F5338-1BF8-4B5C-8DA2-9F7F9CE6C5A5}\MicrosoftEdge_X64_131.0.2903.99.exe
                                                                                      "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{450F5338-1BF8-4B5C-8DA2-9F7F9CE6C5A5}\MicrosoftEdge_X64_131.0.2903.99.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
                                                                                      2⤵
                                                                                      • Executes dropped EXE
                                                                                      PID:1040
                                                                                      • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{450F5338-1BF8-4B5C-8DA2-9F7F9CE6C5A5}\EDGEMITMP_6CA39.tmp\setup.exe
                                                                                        "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{450F5338-1BF8-4B5C-8DA2-9F7F9CE6C5A5}\EDGEMITMP_6CA39.tmp\setup.exe" --install-archive="C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{450F5338-1BF8-4B5C-8DA2-9F7F9CE6C5A5}\MicrosoftEdge_X64_131.0.2903.99.exe" --msedgewebview --verbose-logging --do-not-launch-msedge --system-level
                                                                                        3⤵
                                                                                        • Checks computer location settings
                                                                                        • Executes dropped EXE
                                                                                        • Drops file in Program Files directory
                                                                                        PID:756
                                                                                        • C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{450F5338-1BF8-4B5C-8DA2-9F7F9CE6C5A5}\EDGEMITMP_6CA39.tmp\setup.exe
                                                                                          "C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{450F5338-1BF8-4B5C-8DA2-9F7F9CE6C5A5}\EDGEMITMP_6CA39.tmp\setup.exe" --type=crashpad-handler /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Program Files\MsEdgeCrashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=131.0.6778.140 "--annotation=exe=C:\Program Files (x86)\Microsoft\EdgeUpdate\Install\{450F5338-1BF8-4B5C-8DA2-9F7F9CE6C5A5}\EDGEMITMP_6CA39.tmp\setup.exe" --annotation=plat=Win64 --annotation=prod=Edge --annotation=ver=131.0.2903.99 --initial-client-data=0x21c,0x220,0x224,0x1f8,0x228,0x7ff72a7c2918,0x7ff72a7c2924,0x7ff72a7c2930
                                                                                          4⤵
                                                                                          • Executes dropped EXE
                                                                                          • Drops file in Program Files directory
                                                                                          PID:4804

                                                                                  Network

                                                                                  MITRE ATT&CK Enterprise v15

                                                                                  Replay Monitor

                                                                                  Loading Replay Monitor...

                                                                                  Downloads

                                                                                  • C:\Program Files (x86)\Microsoft\EdgeCore\131.0.2903.99\Installer\setup.exe

                                                                                    Filesize

                                                                                    6.6MB

                                                                                    MD5

                                                                                    f6ef6691c60c40c1b64c857aa7140f65

                                                                                    SHA1

                                                                                    0a18181edb6539ace366e7d804e37ec558c52b79

                                                                                    SHA256

                                                                                    df10339c63d2f24162ffa7d61c797f46a4ec4d91f1f74c3290646a232c7e9c56

                                                                                    SHA512

                                                                                    bf2829c18f109ee181518b7819a23782fdee4f81644a9d062e060ccac7a2df27d2f49cb3c26d63e6c9e2aed6ff166f2af596c0365284ef1dc0a70363ea8fd404

                                                                                  • C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe

                                                                                    Filesize

                                                                                    201KB

                                                                                    MD5

                                                                                    9da54f5a8726349124dbdca094448a11

                                                                                    SHA1

                                                                                    a80642cf316be9570494a4c74949024f5d59f042

                                                                                    SHA256

                                                                                    f04efee822f9b2baf2f9b4ea576b9908804b6990497b82c549a34ba54b1b4807

                                                                                    SHA512

                                                                                    d84a5ac786f8bd0eabe4b1c50c7cbac8828ed2e3eb9a064936b65f0cf07f30e7362d44bda1c95a6652708ebb94e139781acf9cf7c0bdc642620136c6d01e2d62

                                                                                  • C:\Program Files\MsEdgeCrashpad\settings.dat

                                                                                    Filesize

                                                                                    280B

                                                                                    MD5

                                                                                    517690cff3228f8f39105801fb251a39

                                                                                    SHA1

                                                                                    50076cd1362e5ad2901356afa172063f33a31dda

                                                                                    SHA256

                                                                                    da8a4cc463091ca3de56f38d6a2cea3d39157aaf462f4e3d9860f1c338145707

                                                                                    SHA512

                                                                                    0f3cb43c91f96c7ef8c1da8a4acc4d94bd5071c40eecf5d44f53988da612316dfa78211cc5e4664151490c134a073917214e59fcfef324b72fd2bbd4d103b75d

                                                                                  • C:\ProgramData\Microsoft\EdgeUpdate\Log\MicrosoftEdgeUpdate.log

                                                                                    Filesize

                                                                                    80KB

                                                                                    MD5

                                                                                    afb23efb431b9de6ffc7fefe445d4d5e

                                                                                    SHA1

                                                                                    8cc855a2706d1dbf5a7a1044179d2a61df1b5292

                                                                                    SHA256

                                                                                    6599def1059b1df51155a02e1ab61a8b21ed7d59106cb2d4cb63634ea157e754

                                                                                    SHA512

                                                                                    cdf5d54dd2d4ba19cec1aef55917956dadb4224ff1731c36a8c8f3ec071fe1fdd28301bd59b812507c37684fc3b637cfec69fd06a79e9b1c30f44116da7a26dc

                                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json

                                                                                    Filesize

                                                                                    20KB

                                                                                    MD5

                                                                                    86b09458e95229b04e4db91f1e6867e4

                                                                                    SHA1

                                                                                    6c3928b0ee95f5af8fb0e9ae25b170c86fd0a5c5

                                                                                    SHA256

                                                                                    bd5849087ec8193d4d112cf0a151898580703f9329e650fdac69922c4fb3e9e5

                                                                                    SHA512

                                                                                    b9d4e9459c03757b1913ac4d0b78e5e7dde24c6b4a5d54b7c22743e56973ac953ff56bcbc5325e1e10b45658cd663d900bb46eb2bd6180a0e2970da0b5af184d

                                                                                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl

                                                                                    Filesize

                                                                                    15KB

                                                                                    MD5

                                                                                    96c542dec016d9ec1ecc4dddfcbaac66

                                                                                    SHA1

                                                                                    6199f7648bb744efa58acf7b96fee85d938389e4

                                                                                    SHA256

                                                                                    7f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798

                                                                                    SHA512

                                                                                    cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658

                                                                                  • C:\Users\Admin\AppData\Local\Temp\Client.exe

                                                                                    Filesize

                                                                                    545KB

                                                                                    MD5

                                                                                    b5a0813e0fd9bfaaf3b9ab5454416bad

                                                                                    SHA1

                                                                                    22a42301bc07e109d419b9452897d9295f1535ce

                                                                                    SHA256

                                                                                    24739383eea2ae838b19e3ca49ac02e5c8cf587204561eb9c7be8ea66a5a4946

                                                                                    SHA512

                                                                                    5cf4d367fcb90d9f26648b9bd52cfdd1b01130f589642b2937b81e3315912a8f49ebfdef01e9e9d5357fd8033ebe1c304d0c6d6107eeef6950dcfa733b36b199

                                                                                  • C:\Users\Admin\AppData\Local\Temp\Exela.exe

                                                                                    Filesize

                                                                                    12.7MB

                                                                                    MD5

                                                                                    a08d53477712581a4ec718cf43839d27

                                                                                    SHA1

                                                                                    1a161be18f60eb4126ae60c434cb1fc77c09d088

                                                                                    SHA256

                                                                                    602b3fe0e712a16ac26765bdf06de1603c8d236e513cb18f9cfe4be75e9b16a7

                                                                                    SHA512

                                                                                    ba4edd7c8300b2726291dbac9066a993b5f399c081d38c38bb3981ea2e12599a31a8d7492d3746dff05972799608b46a86c99ae5502b3994af83e970d30eec50

                                                                                  • C:\Users\Admin\AppData\Local\Temp\Nursultan.exe

                                                                                    Filesize

                                                                                    16.1MB

                                                                                    MD5

                                                                                    981196fd1a024aa93de8d671cb4f66f6

                                                                                    SHA1

                                                                                    7cca3ed98a752359ccf93af39fd08609b1273912

                                                                                    SHA256

                                                                                    f8fba45ce7e00b527540f96707338b7adc8ee5ccc23924145a155fdd87d4ce2f

                                                                                    SHA512

                                                                                    23321f61bf28370634f1ab25b8082535225ac9f255ae39b77e9b11c5c5c92caeb23f7ceaec1ad7e9bdcf27548305176659a80fde53658b74bd603740c1c96470

                                                                                  • C:\Users\Admin\AppData\Local\Temp\XClientik.exe

                                                                                    Filesize

                                                                                    78KB

                                                                                    MD5

                                                                                    d44f6c79c87a5e9ae6dafa886c99fedb

                                                                                    SHA1

                                                                                    cca303f8c2f3b320d4ff65c66bbbca696654d098

                                                                                    SHA256

                                                                                    6394d2182541f5cac623d6a137d2e524b2d0e6a92f413f06e3fab306daa19b7d

                                                                                    SHA512

                                                                                    8673ad41dda04af636471df96cac57155c9440a2baa0020ec48380ef4725556fcbe9029687d6963ce6fff9a74525fca35f40099e18f40b967e3630653e7b77ac

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\VCRUNTIME140.dll

                                                                                    Filesize

                                                                                    117KB

                                                                                    MD5

                                                                                    862f820c3251e4ca6fc0ac00e4092239

                                                                                    SHA1

                                                                                    ef96d84b253041b090c243594f90938e9a487a9a

                                                                                    SHA256

                                                                                    36585912e5eaf83ba9fea0631534f690ccdc2d7ba91537166fe53e56c221e153

                                                                                    SHA512

                                                                                    2f8a0f11bccc3a8cb99637deeda0158240df0885a230f38bb7f21257c659f05646c6b61e993f87e0877f6ba06b347ddd1fc45d5c44bc4e309ef75ed882b82e4e

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\VCRUNTIME140_1.dll

                                                                                    Filesize

                                                                                    48KB

                                                                                    MD5

                                                                                    68156f41ae9a04d89bb6625a5cd222d4

                                                                                    SHA1

                                                                                    3be29d5c53808186eba3a024be377ee6f267c983

                                                                                    SHA256

                                                                                    82a2f9ae1e6146ae3cb0f4bc5a62b7227e0384209d9b1aef86bbcc105912f7cd

                                                                                    SHA512

                                                                                    f7bf8ad7cd8b450050310952c56f6a20b378a972c822ccc253ef3d7381b56ffb3ca6ce3323bea9872674ed1c02017f78ab31e9eb9927fc6b3cba957c247e5d57

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\_asyncio.pyd

                                                                                    Filesize

                                                                                    37KB

                                                                                    MD5

                                                                                    fe4f2e32ed0ea1ef93188939ed5b9564

                                                                                    SHA1

                                                                                    082396142b4c17343695d9ad0d841e73372cddba

                                                                                    SHA256

                                                                                    7319ca620123e4664d6a6aff95ebb43a7a5b0b3cc0df0acb665be1330ed1d6ed

                                                                                    SHA512

                                                                                    3c2ce4589e1ca7f544585bf9fd6bbfe21c49141516a503c6f55ed1eb57b0bc3c53222062599e7213ad82d1b85e6c4e81b3b4bebf0efad4f1acbacd4132f9790c

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\_bz2.pyd

                                                                                    Filesize

                                                                                    48KB

                                                                                    MD5

                                                                                    76dda2f9e6796b85d4c80b7a49585bd0

                                                                                    SHA1

                                                                                    9d8eb7052fd218d75094c87c669a7e4d6d1614b9

                                                                                    SHA256

                                                                                    1ddc1386f8bec84b4c7d17e75a84fd2b7abef20bd3d5cdc648b3884252e78ca3

                                                                                    SHA512

                                                                                    602bfb0b42d3f8184f15082b61692796c18715c9581dbc840069209a2550545bb4af54e35c1f971a6a9a9830b94fb491f4c9f8d5f4899cf1b534ee6388505019

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\_cffi_backend.cp313-win_amd64.pyd

                                                                                    Filesize

                                                                                    71KB

                                                                                    MD5

                                                                                    feb838919a9cbc39fa2f7e47b2cf2fa0

                                                                                    SHA1

                                                                                    4cfb8e03dc507587be9183e08c81c710ca368b86

                                                                                    SHA256

                                                                                    85508735f87ab59af7343101b96337a12d51d6e54227abc3fc139156565c5d8b

                                                                                    SHA512

                                                                                    317913492b361678bc9d7565c011eb201f8bf36fd3c4e3218e00554122db429ca583fa2c0fd782073ab9ae98ba4c228a291d4e71cfc443a8e6d79c051591656c

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\_ctypes.pyd

                                                                                    Filesize

                                                                                    62KB

                                                                                    MD5

                                                                                    83f2a420d3a54dc73dc553faead3bbd4

                                                                                    SHA1

                                                                                    954525c475713acc04fa2116191bd5a914cd881a

                                                                                    SHA256

                                                                                    b50b87720095fe7ed8dfad73f7a6a0bbeb408a24b561a2cfd7e3b333f87bed90

                                                                                    SHA512

                                                                                    21a80a2a6e3ca2e87df87bf3c34f0a61be441ca5d7bcb9fe7d35dfbce17a02ec04153e72864b284c001f6edcf4f7260476b21c2881614d0f632eeaa34656b1ac

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\_decimal.pyd

                                                                                    Filesize

                                                                                    117KB

                                                                                    MD5

                                                                                    2bbe0345bba0ceb1dfead3bd326e32f7

                                                                                    SHA1

                                                                                    7675f9a476b2ba7a3a76d825faddc9795d2e5afd

                                                                                    SHA256

                                                                                    79e9cf484191193a12126625bf8f8a929c51de8c0dd743f52eab49f86b313818

                                                                                    SHA512

                                                                                    9da97707bf77240ff8557d0a9f6c4cbefd0bd4d4c9b5528de9f588135f98fe9cd7b6d854068fb85df4d95d29b9981daf6d26f8abb94d483d0671bd9a79fbf53a

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\_hashlib.pyd

                                                                                    Filesize

                                                                                    35KB

                                                                                    MD5

                                                                                    e34a96f476a486da9f3a461abc2df8cc

                                                                                    SHA1

                                                                                    d70836f9ac2cd98c25b51c96f268674e95f53b26

                                                                                    SHA256

                                                                                    72d71d3e5ab403221d8e6ab292b97652fa194cf038fbd31afdf8ef61f1fbcf8e

                                                                                    SHA512

                                                                                    0e2ee8d50a85c450d29002975df616c2318d6e4d52caa0172d2ba46439a9c1fd0b639593852035b0585ccd6d84ba66ba46c79b6cb50e99dc5cff4988ea8af724

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\_lzma.pyd

                                                                                    Filesize

                                                                                    86KB

                                                                                    MD5

                                                                                    4c91d0d2bd873740d3b835cd29ba4806

                                                                                    SHA1

                                                                                    76a4a59ea939d87177dc2e600a444bc908729d9a

                                                                                    SHA256

                                                                                    95578954b3282a5ed9c2db1e214cf3b4459afd955eabc898a896344b02908aba

                                                                                    SHA512

                                                                                    f551a17495b7620dbf6d60cf40c29f6a4ceb5afee31472e398492491308023e7401a334c50883f37b60767d209801be4611a6f57ed16a419b06ab8ad5c967565

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\_multiprocessing.pyd

                                                                                    Filesize

                                                                                    27KB

                                                                                    MD5

                                                                                    3694bc10cac00d42b50bcf99cb9a8fc6

                                                                                    SHA1

                                                                                    3cffdb605d1e063dba0539400dbf6458a0351a03

                                                                                    SHA256

                                                                                    7bdefee7fbea26a231335cf4b58e6bafe2016275cd274339fdebfd7738d0be1d

                                                                                    SHA512

                                                                                    f5c905689ed17478c1cf66836fe43de656339a678b3f2c0028f196430e9e8d0431621158f03c4368a4eeceafd20904cd7ee89d554b839c21436a48ee65337159

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\_overlapped.pyd

                                                                                    Filesize

                                                                                    33KB

                                                                                    MD5

                                                                                    ff936ad394f51e00cfa20b497820dc24

                                                                                    SHA1

                                                                                    02bc239848b717c0a71cefaa85ec7de44ef2e266

                                                                                    SHA256

                                                                                    c7a497d8bb056b55b7e8882c34e250afe3e3bf76f8691d6a90b3f24361ff672d

                                                                                    SHA512

                                                                                    2bccb9399b478516b85535cfb8ceb9c48ab9ab69df70f230a2f0e12506486f1935204bd931ea8cb4f3298bd00f9f7254278fa6739446c14ae0f0e9a0839f313e

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\_queue.pyd

                                                                                    Filesize

                                                                                    26KB

                                                                                    MD5

                                                                                    c7fdadca43547314c311fd077520000e

                                                                                    SHA1

                                                                                    c166a575e2896bd2700af2c43f7edae023304252

                                                                                    SHA256

                                                                                    6a984ba75337e4487a97646227a14a559eb752e76c831ff413165b5938b6fc69

                                                                                    SHA512

                                                                                    44be37526ddacdde4406a150d72278b2c2689051475d4ace5262d8a6425ab752fd22d0873b8e35620adae12f7c2c75b8feba8315863fb14c1ec1f8d311fc0431

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\_socket.pyd

                                                                                    Filesize

                                                                                    44KB

                                                                                    MD5

                                                                                    574c2fee96efa2d63952a6042ee3272f

                                                                                    SHA1

                                                                                    22146b2592bd9aa086632c554f252a5ca92305cd

                                                                                    SHA256

                                                                                    66a745d27d7fdbe039f3ba2b82273eddcdcb8613cd17588682153fafd4b93384

                                                                                    SHA512

                                                                                    078e15e0a508c4035c2b83e458bab95ea56ef941d5505280fc207053be90d072699ec39b5094490ab495fd5041d2c684d0260e5a88ad2c68b199d04340ab4a1b

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\_sqlite3.pyd

                                                                                    Filesize

                                                                                    58KB

                                                                                    MD5

                                                                                    d8a9c98fae2b577c8cb4246e9875de10

                                                                                    SHA1

                                                                                    27b2a31ec26009a4c8a242f3c54b56e46d606070

                                                                                    SHA256

                                                                                    ccf4c7a8efce2a995a91548efc894859922be003ae1c2a00c75123c3453c711b

                                                                                    SHA512

                                                                                    cc519d00f67fc493ed9d9dccc0f6daa2c110247096d12ffdc9da69f7f0f11b11a1a333e6449f2c713b167c629ba9179a8c0083726cf25d8a04196045aed7cd66

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\_ssl.pyd

                                                                                    Filesize

                                                                                    66KB

                                                                                    MD5

                                                                                    51296f2f4ba52ad6a1f88471b34a42fa

                                                                                    SHA1

                                                                                    6e97e59a6438774ab8502157cc6139864cf8dff8

                                                                                    SHA256

                                                                                    edca2535998bc0f193f706d33f92324224587b353ce8cd1ad00836ad9093ffd1

                                                                                    SHA512

                                                                                    4bf99768f09cebf94c66f359b4e5c0fa03a44b7cd9f6df085d8d5287d66962cf4d654df243e853d9c4fb172a4b366d97a20367c7b3f4fcab81c63b0af3d6c21e

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\_uuid.pyd

                                                                                    Filesize

                                                                                    25KB

                                                                                    MD5

                                                                                    3acf3138d5550ca6de7e2580e076e0f7

                                                                                    SHA1

                                                                                    3e878a18df2362aa6f0bdbfa058dca115e70d0b8

                                                                                    SHA256

                                                                                    f9d5008f0772aa0720bc056a6ecd5a2a3f24965e4b470b022d88627a436c1ffe

                                                                                    SHA512

                                                                                    f05e90a0feaa2994b425884af32149fbbe2e11cb7499fc88ca92d8a74410edcd62b2b2c0f1ecd1a46985133f7e89575f2c114bd01f619c22ce52f3cf2a7e37c4

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\_wmi.pyd

                                                                                    Filesize

                                                                                    28KB

                                                                                    MD5

                                                                                    b263987e0a3cc69177351ef8c72931c0

                                                                                    SHA1

                                                                                    662f37a7c48feee8ddc2acfac21267ed168f0060

                                                                                    SHA256

                                                                                    9a72f30c62104ee4218519c244f9883890f7e116b546e77ca294d4c39cddf289

                                                                                    SHA512

                                                                                    f9a6ac77bf31e3ad42bb410197915e8c06f06d50053befd488df237b88a3554117f58c172045eea2a606034908dfe30874514abd93e06c8bf7d0d0903aa27c4a

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\base_library.zip

                                                                                    Filesize

                                                                                    1.3MB

                                                                                    MD5

                                                                                    a9cbd0455b46c7d14194d1f18ca8719e

                                                                                    SHA1

                                                                                    e1b0c30bccd9583949c247854f617ac8a14cbac7

                                                                                    SHA256

                                                                                    df6c19637d239bfedc8cd13d20e0938c65e8fdf340622ff334db533f2d30fa19

                                                                                    SHA512

                                                                                    b92468e71490a8800e51410df7068dd8099e78c79a95666ecf274a9e9206359f049490b8f60b96081fafd872ec717e67020364bcfa972f26f0d77a959637e528

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\cryptography\hazmat\bindings\_rust.pyd

                                                                                    Filesize

                                                                                    2.0MB

                                                                                    MD5

                                                                                    606a84af5a9cf8ad3cb0314e77fb7209

                                                                                    SHA1

                                                                                    6de88d8554488ffe3e48c9b14886da16d1703a69

                                                                                    SHA256

                                                                                    0693ffa4990fa8c1664485f3d2a41b581eac0b340d07d62242052a67bf2ed5c3

                                                                                    SHA512

                                                                                    97d451f025aefb487c5cea568eb430356adfe23908321f1c04f8fa4c03df87507eda8d9612c944be4fa733df4cec38a0e37bffd8865088064b749244d4321b1f

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\libcrypto-3.dll

                                                                                    Filesize

                                                                                    1.6MB

                                                                                    MD5

                                                                                    f5c66bbd34fc2839f2c8afa5a70c4e2c

                                                                                    SHA1

                                                                                    a085085dbf5396ca45801d63d9681b20f091414c

                                                                                    SHA256

                                                                                    7ff3ccb7903f8bc1b872c948cfff4520c51539ae184f93b7bd9c04bf60f4a7f4

                                                                                    SHA512

                                                                                    fc108dfa1ef75b4a4c45c3fae1ccb9257e8950a17f6374fef5080df69ffd52928e5bcac0490772d4d57091e0d81ea58cd1d6d34ec6993e30c1b4c5704be7044b

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\libffi-8.dll

                                                                                    Filesize

                                                                                    29KB

                                                                                    MD5

                                                                                    0d1c6b92d091cef3142e32ac4e0cc12e

                                                                                    SHA1

                                                                                    440dad5af38035cb0984a973e1f266deff2bd7fc

                                                                                    SHA256

                                                                                    11ee9c7fb70c3756c0392843245935517171b95cc5ba0d696b2c1742c8d46fb6

                                                                                    SHA512

                                                                                    5d514ecab93941e83c008f0e9749f99e330949580884bf4850b11cac08fe1ac4ac50033e8888045fe4a9d8b4d2e3ea667b39be18f77266d00f8d7d6797260233

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\libssl-3.dll

                                                                                    Filesize

                                                                                    221KB

                                                                                    MD5

                                                                                    fc9d8dea869ea56ff6612a2c577394bf

                                                                                    SHA1

                                                                                    f30bc2bceb36e5e08c348936c791abaa93fd5b25

                                                                                    SHA256

                                                                                    8ec0a7ac78f483bf55585d53f77d23934a4d15665e06fbd73c4addf1c9e6c959

                                                                                    SHA512

                                                                                    929f5e08142e56f2d8067dac5d7457c72221da73e4cf6259da1982c5308b93dbec77d87cef89294a68441da77fa1923d6c9f812f714f6061ff9952f4f17783df

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\pyexpat.pyd

                                                                                    Filesize

                                                                                    88KB

                                                                                    MD5

                                                                                    59c087c4a65839c69e3a59e129512563

                                                                                    SHA1

                                                                                    e5a39768dbd0be72f03c45a2d2eea9c802bb0f35

                                                                                    SHA256

                                                                                    1bba10c40afdad06f99d51624ecd0dfef43a4cee0beec5e5a21d61ae06cbdb49

                                                                                    SHA512

                                                                                    7c6f8164f0270b6aee2b30a66a44a094b987b6e6aaa2e34fdfcbc16b80143b76c430fd65871e5dcbe5338b8ad8b4635ff343bdfd09017b1d00663f31d4e5ef6a

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\python3.dll

                                                                                    Filesize

                                                                                    68KB

                                                                                    MD5

                                                                                    16855ebef31c5b1ebe767f1c617645b3

                                                                                    SHA1

                                                                                    315521f3a748abfa35cd4d48e8dd09d0556d989b

                                                                                    SHA256

                                                                                    a5c6a329698490a035133433928d04368ce6285bb91a9d074fc285de4c9a32a4

                                                                                    SHA512

                                                                                    c3957b3bd36b10c7ad6ea1ff3bc7bd65cdceb3e6b4195a25d0649aa0da179276ce170da903d77b50a38fc3d5147a45be32dbcfdbfbf76cc46301199c529adea4

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\python313.dll

                                                                                    Filesize

                                                                                    1.8MB

                                                                                    MD5

                                                                                    d99ac8bac1343105b642295397ca2ffc

                                                                                    SHA1

                                                                                    93fd73c1fb9ee99ddc66d38885a657cf81f62836

                                                                                    SHA256

                                                                                    9116e56cedeb1c4ae82b4bde560f2fe0b83a16764865012cbf5501673d3c5536

                                                                                    SHA512

                                                                                    89d30bc84978daf469008ffc347cbd3e189f1df2c1a302dedfc2b700267cc28c671c7c35b5e95ba29a300e7fda75ccfc720d2173ea6db6eb69978772c0b8339f

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\select.pyd

                                                                                    Filesize

                                                                                    25KB

                                                                                    MD5

                                                                                    9d6ec4a3d6011af6c1a18163d2f2dcd8

                                                                                    SHA1

                                                                                    04ff12fc1c8e185a65051b5ccd0e467bb997fe73

                                                                                    SHA256

                                                                                    fe525f24259716b6786c4ef169e106a977b06d7ef6661e63668551d96e03f31c

                                                                                    SHA512

                                                                                    6e9fc605f3319e563d880a573522f4361d24fc5731bff90f069fed053ab7f5159e69a8292929fbc0c56aa369fb350b5eee0c1dedb692e26221b7d7e7bd2d92b2

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\setuptools\_vendor\jaraco\text\Lorem ipsum.txt

                                                                                    Filesize

                                                                                    1KB

                                                                                    MD5

                                                                                    4ce7501f6608f6ce4011d627979e1ae4

                                                                                    SHA1

                                                                                    78363672264d9cd3f72d5c1d3665e1657b1a5071

                                                                                    SHA256

                                                                                    37fedcffbf73c4eb9f058f47677cb33203a436ff9390e4d38a8e01c9dad28e0b

                                                                                    SHA512

                                                                                    a4cdf92725e1d740758da4dd28df5d1131f70cef46946b173fe6956cc0341f019d7c4fecc3c9605f354e1308858721dada825b4c19f59c5ad1ce01ab84c46b24

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\sqlite3.dll

                                                                                    Filesize

                                                                                    643KB

                                                                                    MD5

                                                                                    739c7cfbb423ecc578012a1e968845c4

                                                                                    SHA1

                                                                                    b33937e491e611afbb1f7588647bdbf7ca36721e

                                                                                    SHA256

                                                                                    f71744ff7a6fb0bfe988b15453c258e53d6db7f08f3e6a50753dcc2a2990b72c

                                                                                    SHA512

                                                                                    4bb21339c39de65c604b73c46963d2e7e5cf31d33a1cdd7ac5c4b8ccc1fd88863a6342f7ba48d694ca6944764f7eec4e0b64851334781e3eddad743d8a8ed47b

                                                                                  • C:\Users\Admin\AppData\Local\Temp\_MEI42842\unicodedata.pyd

                                                                                    Filesize

                                                                                    260KB

                                                                                    MD5

                                                                                    d06c37a2f1e9298433c1f40b2b5dfac6

                                                                                    SHA1

                                                                                    86a3b9edcae4ef141ce40d96551e73fd8d886b66

                                                                                    SHA256

                                                                                    c1eec492fccad5913c86e43cd6f2ed8d9660561ff15e43a2649f6848ef2105aa

                                                                                    SHA512

                                                                                    e40d1042a36145b7f233c6f8af1c191f622629aacfb5dffbd9ba99132b68cddd2fda194068a07ace2b351c0050172815bbfc1bc5e3e3cdc5135239384384f0fc

                                                                                  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_yl5ixq2r.yvg.ps1

                                                                                    Filesize

                                                                                    60B

                                                                                    MD5

                                                                                    d17fe0a3f47be24a6453e9ef58c94641

                                                                                    SHA1

                                                                                    6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                    SHA256

                                                                                    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                    SHA512

                                                                                    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                  • C:\Users\Admin\AppData\Local\Temp\tmpaddon

                                                                                    Filesize

                                                                                    479KB

                                                                                    MD5

                                                                                    09372174e83dbbf696ee732fd2e875bb

                                                                                    SHA1

                                                                                    ba360186ba650a769f9303f48b7200fb5eaccee1

                                                                                    SHA256

                                                                                    c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f

                                                                                    SHA512

                                                                                    b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                                                                                    Filesize

                                                                                    6KB

                                                                                    MD5

                                                                                    a8059e010d53eee60224fb406701f940

                                                                                    SHA1

                                                                                    433d163a6163f538e389a933f9a9bc04a7813ca7

                                                                                    SHA256

                                                                                    7ff57f9bc5a32c7828b5e7756766d9ed11c6234543a00695c0c48ddf0d2427cc

                                                                                    SHA512

                                                                                    32ef2de448a9d2a0f42dd15c16e7b210062c3e5e998ba71058510176aca6a49b59a24798aed4dada91b292d9a282733826932c237eeacf37aaf20d4d3fe4aad1

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin

                                                                                    Filesize

                                                                                    8KB

                                                                                    MD5

                                                                                    4a10a34af378ecb7403ccf1a6751d924

                                                                                    SHA1

                                                                                    b061070d9df0af6f1bfbca0555ddca3ef9039a53

                                                                                    SHA256

                                                                                    275196e1c2f96bc94c3ecc2284de2b1b86291a30aa40ead90a43527e0e1d098d

                                                                                    SHA512

                                                                                    b163866b3468a8c69778343cf67b88f2982ed11cfa87b8de0fd2c56f644ad208e5a84f328d2d29d6a3378a61d5d039d79989f978a4db8449c22b7c465443061e

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                                                                    Filesize

                                                                                    5KB

                                                                                    MD5

                                                                                    35a344c3a8750ff54cd2cccd067f9ba4

                                                                                    SHA1

                                                                                    0714968b281c5cd488968e046c464274257afa1e

                                                                                    SHA256

                                                                                    a6a319e6862e931441f597cc8654fed3b71af2c2212ddd396ee038dfbed23d3b

                                                                                    SHA512

                                                                                    4fd4e139c7316313e8b508f1d515da44c65d82cf2260385d11426a77706bcc150c87c1cdee964decc1fd912ffd0a11eb9c4ff72e083e6e09997bd3678c5199bc

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                                                                    Filesize

                                                                                    6KB

                                                                                    MD5

                                                                                    5b682e8b5b87498a191fd9df5c74dc1d

                                                                                    SHA1

                                                                                    ca48700a39c68f8281eae5ef9b0bb7a46deb49cf

                                                                                    SHA256

                                                                                    b298e009e4fdf89c4dd5d7b0926a312f1a3b77846d29c242a063c983d66388fa

                                                                                    SHA512

                                                                                    ba1c8160c361e5ecefe614a772072746620048855446cc75765fdd5c677c52342e14840843ed2cc3721a669b207100dce74f5b810e6fb6fc7fdc550a1526de15

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp

                                                                                    Filesize

                                                                                    17KB

                                                                                    MD5

                                                                                    5d5ca0c72697dc9cd389d7ea5fb7c5df

                                                                                    SHA1

                                                                                    aff3f395552ebf924504bbe91d521e03e21bdf3b

                                                                                    SHA256

                                                                                    063b94ebb9d4f30a8eceb2912985399c7252e2e81c5106d91b8de88d45005560

                                                                                    SHA512

                                                                                    881365f78a8fe73178cc100a8186c0cdf6eace5394258f97e572655c9540a2f38b6eb446cc73ad0ef7c20c4323d827319df4866c7d140cabdedb40b50fedccac

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\6d98c68a-b0ca-48bb-bc45-6089ed9899e9

                                                                                    Filesize

                                                                                    982B

                                                                                    MD5

                                                                                    0f2c0a62ccf7a26d5c7c8b02ee93fc87

                                                                                    SHA1

                                                                                    30c0c286aedbeb8b0de372462c68904815f93674

                                                                                    SHA256

                                                                                    04da6723b72db81e39aea9f8497973816ca190919df3af920c53d3b5a212b50b

                                                                                    SHA512

                                                                                    7cdb0382c6da7cc92090bc7ae969a8ef51e3c49a8bb4ddcbd314c932880a8c26f410b60b692b261b8ff135b39de519c73f145d2322d4d98a30aa57af35031912

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\78be49af-cff1-4e8f-b562-bb65d72fd8aa

                                                                                    Filesize

                                                                                    13KB

                                                                                    MD5

                                                                                    f11cb1d801e7ab893bb1aebaa9d3615f

                                                                                    SHA1

                                                                                    a36580d469d059f89619923a47a6d46ed6948d72

                                                                                    SHA256

                                                                                    40f122a21111ef2d4f6cc6441f803cfae0b60da6916fe5c088b361cecbe4d4b2

                                                                                    SHA512

                                                                                    8cf4f0bc6d6a063aa3104c90f0486100ef4cc9b35633f3690721876ca55bd83b08c4197dc92475d1cdbb7eebdcbc20147d37cf57380f84abf1e9c838cdba8ca3

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\a7c1accc-e315-4c2e-83da-c5a3d88d7bcc

                                                                                    Filesize

                                                                                    671B

                                                                                    MD5

                                                                                    7f46a357e1f97aef8aaf89af871621ee

                                                                                    SHA1

                                                                                    16bc1986fb658a6df1a93f49c5e687b260374f7e

                                                                                    SHA256

                                                                                    68c9f1cf9d8600aeaf20f2029400df0e85a002b48b3b330006a42e09b170c88a

                                                                                    SHA512

                                                                                    176c9d041fc7368c96d20cf32f6b90d3ed0f9d553d86c514bf9445d92ced8819a711837d2fdb6677f681159cbc7f2f5ea94aa659c87295a44875e9031745750b

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\d648c023-5926-450d-bd88-1685d2117b81

                                                                                    Filesize

                                                                                    27KB

                                                                                    MD5

                                                                                    eb90991afd42e25c6dd32cd9836acd09

                                                                                    SHA1

                                                                                    1d76d8980300f469ab56f0249ae1a9fb815bfd92

                                                                                    SHA256

                                                                                    f969ae527407cce4f10913bd23cf4f37201b7c73bbce5858a107a5cff324eea6

                                                                                    SHA512

                                                                                    4739c0681eda2b7d336bef7d23f4a0c565bd1c80a1500dfd42430e85b72b63781e0e0a5d4471e1da6a47600cd87f92e7d4419b3b92d03c560ec7dfaa5993a487

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll

                                                                                    Filesize

                                                                                    1.1MB

                                                                                    MD5

                                                                                    842039753bf41fa5e11b3a1383061a87

                                                                                    SHA1

                                                                                    3e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153

                                                                                    SHA256

                                                                                    d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c

                                                                                    SHA512

                                                                                    d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info

                                                                                    Filesize

                                                                                    116B

                                                                                    MD5

                                                                                    2a461e9eb87fd1955cea740a3444ee7a

                                                                                    SHA1

                                                                                    b10755914c713f5a4677494dbe8a686ed458c3c5

                                                                                    SHA256

                                                                                    4107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc

                                                                                    SHA512

                                                                                    34f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                                                                                    Filesize

                                                                                    10KB

                                                                                    MD5

                                                                                    cd7899452739bc77d4ae6688ef25e9c6

                                                                                    SHA1

                                                                                    30223e927f6fbc82a2d9103eb00263a78708092d

                                                                                    SHA256

                                                                                    c7ca7590f372069a12e74bfa0afb7e2d9990664f7d29bf1b36f689c9ea3333a5

                                                                                    SHA512

                                                                                    affa07d9b4daff2c9fafc6876659c17fbff41b336b6c078cf81057e5e43b0b7c178b4f25c09f74574c26c376a2e0048f3ea2c19a2daa67e3c972a1a75b13a834

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs-1.js

                                                                                    Filesize

                                                                                    11KB

                                                                                    MD5

                                                                                    4ad306ab17a25d03059a9bd4f6f67a58

                                                                                    SHA1

                                                                                    48c6301c94e86b5a7b1904131c2ec3f79637ed8b

                                                                                    SHA256

                                                                                    665acd06f1484b0cedd4c5422955fac466ed960e51392fec31f2345dd3ef5ee6

                                                                                    SHA512

                                                                                    154a0839401f5dbcb843ef66b63a5e2ba6766a613ad4a82e552eb202fe2c39af503b61d72d085d1932e89aad6fd4723dc6a437f7ba772e297c9a8d234f8cd7d4

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\prefs.js

                                                                                    Filesize

                                                                                    10KB

                                                                                    MD5

                                                                                    0151c6eaee1008d2d8591ea60e7d918b

                                                                                    SHA1

                                                                                    8d41b1fd672e0249a7fe704798201f6b1571435f

                                                                                    SHA256

                                                                                    eefe84b0b96eb5a6f499b430878510b8b7316859bcc5eee80b270f320501f4a9

                                                                                    SHA512

                                                                                    5d0a7e17d9e508c53583722da31ce68bc3d4f1d83a8765bebfb24e4b06b8d5a9c1c8bd8d6f8ea8c0104b56c3a6dad6882f30dcf7c5279c096312a995fc6f7c26

                                                                                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\sessionstore-backups\recovery.baklz4

                                                                                    Filesize

                                                                                    2KB

                                                                                    MD5

                                                                                    9f0df530ce3ae3e8cb5290c9a9f84654

                                                                                    SHA1

                                                                                    6d2420e7a123af97a9c7ca0d35a1f4dc757106e8

                                                                                    SHA256

                                                                                    f8852cdea63ca888eef03d675a5f648caff2e535975023ebb245516ba42840e3

                                                                                    SHA512

                                                                                    5425df646a2061b777f18011690d760413df6ad606d75d35c081ba18ee58df5df6f1b22909b61967e83f1a46d58c676a6c6e32a279c8398a346ccc5ab7bcec33

                                                                                  • C:\Users\Admin\Desktop\New folder\MicrosoftEdgeWebview2Setup.exe

                                                                                    Filesize

                                                                                    1.6MB

                                                                                    MD5

                                                                                    ec5b2a3126f46e01e1fcbb215d4f9ec8

                                                                                    SHA1

                                                                                    77cfa2daad5e57e62d39c5f7323c4f68032c3152

                                                                                    SHA256

                                                                                    09c2a441a22186cbcc90e0a79556c4c696446740955c9031f8b52e84c7cd4ec1

                                                                                    SHA512

                                                                                    b0f5ec2cd2f120de85408a57070ffc078cad2eb8cc6f93874008c392a0f7629f6ecba9d74cd3462f7868f110b12664853eae11c64f3b2d237dd4f901a1f307b3

                                                                                  • C:\Users\Admin\Desktop\New folder\nurik.exe

                                                                                    Filesize

                                                                                    27.4MB

                                                                                    MD5

                                                                                    7bfe8c145eecb2d8ca00fe36686cb56a

                                                                                    SHA1

                                                                                    d628047397e0be9600e5ad4d2c5874658f83b403

                                                                                    SHA256

                                                                                    9d115b6e7644393c678e669e54366b47728031f778e24105622b1227fb639a67

                                                                                    SHA512

                                                                                    b4d9a33b168a28a34b98b842a25fd7aee34dc6dd45d14d1343166616caf11d2928e564790aa61c506c575c5afa266b5abc0eb72db89a79b6103d9e9f3f61d8fb

                                                                                  • C:\Users\Admin\Downloads\Nursultan crack.skY-sB11.rar.part

                                                                                    Filesize

                                                                                    27.4MB

                                                                                    MD5

                                                                                    4de6de98383eb0e501bd41963f5d7447

                                                                                    SHA1

                                                                                    f7733cea8a270ed646eee29e5be9ad9a7d75202a

                                                                                    SHA256

                                                                                    7eb554c0fdec4f344d47508de451fcaab949e7fc9f9c32936975f9b558c4b1a7

                                                                                    SHA512

                                                                                    70abe7f598cc2e87d06a118f70705eae3fde490faafeefbbe9aa0c52e53271b0ec16deed553930a7cfbc7673af76819f14e0f14922af6941031cdf08701240d9

                                                                                  • memory/388-1019-0x0000000000D00000-0x0000000000D35000-memory.dmp

                                                                                    Filesize

                                                                                    212KB

                                                                                  • memory/388-1020-0x0000000075020000-0x0000000075246000-memory.dmp

                                                                                    Filesize

                                                                                    2.1MB

                                                                                  • memory/1436-557-0x0000000000420000-0x000000000043A000-memory.dmp

                                                                                    Filesize

                                                                                    104KB

                                                                                  • memory/1636-769-0x00000254C6DB0000-0x00000254C6DD2000-memory.dmp

                                                                                    Filesize

                                                                                    136KB

                                                                                  • memory/1976-734-0x00007FFDBBD60000-0x00007FFDBBD62000-memory.dmp

                                                                                    Filesize

                                                                                    8KB

                                                                                  • memory/1976-733-0x00007FFDBBD50000-0x00007FFDBBD52000-memory.dmp

                                                                                    Filesize

                                                                                    8KB

                                                                                  • memory/1976-737-0x0000000140000000-0x0000000141F18000-memory.dmp

                                                                                    Filesize

                                                                                    31.1MB

                                                                                  • memory/2616-545-0x0000000000370000-0x0000000001EDA000-memory.dmp

                                                                                    Filesize

                                                                                    27.4MB

                                                                                  • memory/3032-662-0x0000000000740000-0x00000000007CE000-memory.dmp

                                                                                    Filesize

                                                                                    568KB

                                                                                  • memory/4608-691-0x00007FFDACF10000-0x00007FFDACF1F000-memory.dmp

                                                                                    Filesize

                                                                                    60KB

                                                                                  • memory/4608-724-0x00007FFD9C050000-0x00007FFD9C088000-memory.dmp

                                                                                    Filesize

                                                                                    224KB

                                                                                  • memory/4608-725-0x00007FFD9C030000-0x00007FFD9C046000-memory.dmp

                                                                                    Filesize

                                                                                    88KB

                                                                                  • memory/4608-731-0x00007FFD9BE80000-0x00007FFD9BE9B000-memory.dmp

                                                                                    Filesize

                                                                                    108KB

                                                                                  • memory/4608-730-0x00007FFD9AC20000-0x00007FFD9ACD3000-memory.dmp

                                                                                    Filesize

                                                                                    716KB

                                                                                  • memory/4608-729-0x00007FFD9BFC0000-0x00007FFD9BFE2000-memory.dmp

                                                                                    Filesize

                                                                                    136KB

                                                                                  • memory/4608-728-0x00007FFD9BFF0000-0x00007FFD9C004000-memory.dmp

                                                                                    Filesize

                                                                                    80KB

                                                                                  • memory/4608-727-0x00007FFD9C240000-0x00007FFD9C254000-memory.dmp

                                                                                    Filesize

                                                                                    80KB

                                                                                  • memory/4608-726-0x00007FFD9C010000-0x00007FFD9C022000-memory.dmp

                                                                                    Filesize

                                                                                    72KB

                                                                                  • memory/4608-721-0x00007FFD91CE0000-0x00007FFD924DB000-memory.dmp

                                                                                    Filesize

                                                                                    8.0MB

                                                                                  • memory/4608-690-0x00007FFD9C440000-0x00007FFD9C467000-memory.dmp

                                                                                    Filesize

                                                                                    156KB

                                                                                  • memory/4608-692-0x00007FFD9C420000-0x00007FFD9C439000-memory.dmp

                                                                                    Filesize

                                                                                    100KB

                                                                                  • memory/4608-697-0x00007FFD9C3D0000-0x00007FFD9C3E9000-memory.dmp

                                                                                    Filesize

                                                                                    100KB

                                                                                  • memory/4608-698-0x00007FFDA8F80000-0x00007FFDA8F8D000-memory.dmp

                                                                                    Filesize

                                                                                    52KB

                                                                                  • memory/4608-699-0x00007FFDA8970000-0x00007FFDA897D000-memory.dmp

                                                                                    Filesize

                                                                                    52KB

                                                                                  • memory/4608-703-0x00007FFDA64C0000-0x00007FFDA64CF000-memory.dmp

                                                                                    Filesize

                                                                                    60KB

                                                                                  • memory/4608-732-0x00007FFD941D0000-0x00007FFD94703000-memory.dmp

                                                                                    Filesize

                                                                                    5.2MB

                                                                                  • memory/4608-704-0x00007FFD9C240000-0x00007FFD9C254000-memory.dmp

                                                                                    Filesize

                                                                                    80KB

                                                                                  • memory/4608-739-0x00007FFD9C1D0000-0x00007FFD9C204000-memory.dmp

                                                                                    Filesize

                                                                                    208KB

                                                                                  • memory/4608-743-0x00007FFD9ACE0000-0x00007FFD9AE5F000-memory.dmp

                                                                                    Filesize

                                                                                    1.5MB

                                                                                  • memory/4608-742-0x00007FFDAC620000-0x00007FFDAC631000-memory.dmp

                                                                                    Filesize

                                                                                    68KB

                                                                                  • memory/4608-748-0x00007FFDAD320000-0x00007FFDAD33E000-memory.dmp

                                                                                    Filesize

                                                                                    120KB

                                                                                  • memory/4608-745-0x00007FFD91CE0000-0x00007FFD924DB000-memory.dmp

                                                                                    Filesize

                                                                                    8.0MB

                                                                                  • memory/4608-744-0x00007FFDAC5E0000-0x00007FFDAC612000-memory.dmp

                                                                                    Filesize

                                                                                    200KB

                                                                                  • memory/4608-741-0x00007FFDACDF0000-0x00007FFDACE3D000-memory.dmp

                                                                                    Filesize

                                                                                    308KB

                                                                                  • memory/4608-740-0x00007FFDACE40000-0x00007FFDACE58000-memory.dmp

                                                                                    Filesize

                                                                                    96KB

                                                                                  • memory/4608-706-0x00007FFD941D0000-0x00007FFD94703000-memory.dmp

                                                                                    Filesize

                                                                                    5.2MB

                                                                                  • memory/4608-768-0x00007FFD9C030000-0x00007FFD9C046000-memory.dmp

                                                                                    Filesize

                                                                                    88KB

                                                                                  • memory/4608-708-0x00007FFD9C1D0000-0x00007FFD9C204000-memory.dmp

                                                                                    Filesize

                                                                                    208KB

                                                                                  • memory/4608-711-0x00007FFD9C100000-0x00007FFD9C1CE000-memory.dmp

                                                                                    Filesize

                                                                                    824KB

                                                                                  • memory/4608-715-0x00007FFD96090000-0x00007FFD966F3000-memory.dmp

                                                                                    Filesize

                                                                                    6.4MB

                                                                                  • memory/4608-716-0x00007FFD9C0C0000-0x00007FFD9C0F6000-memory.dmp

                                                                                    Filesize

                                                                                    216KB

                                                                                  • memory/4608-972-0x00007FFD96090000-0x00007FFD966F3000-memory.dmp

                                                                                    Filesize

                                                                                    6.4MB

                                                                                  • memory/4608-997-0x00007FFDACDF0000-0x00007FFDACE3D000-memory.dmp

                                                                                    Filesize

                                                                                    308KB

                                                                                  • memory/4608-996-0x00007FFDACE40000-0x00007FFDACE58000-memory.dmp

                                                                                    Filesize

                                                                                    96KB

                                                                                  • memory/4608-990-0x00007FFD9C030000-0x00007FFD9C046000-memory.dmp

                                                                                    Filesize

                                                                                    88KB

                                                                                  • memory/4608-989-0x00007FFD9C050000-0x00007FFD9C088000-memory.dmp

                                                                                    Filesize

                                                                                    224KB

                                                                                  • memory/4608-988-0x00007FFD91CE0000-0x00007FFD924DB000-memory.dmp

                                                                                    Filesize

                                                                                    8.0MB

                                                                                  • memory/4608-987-0x00007FFD9ACE0000-0x00007FFD9AE5F000-memory.dmp

                                                                                    Filesize

                                                                                    1.5MB

                                                                                  • memory/4608-984-0x00007FFD9C100000-0x00007FFD9C1CE000-memory.dmp

                                                                                    Filesize

                                                                                    824KB

                                                                                  • memory/4608-983-0x00007FFD9C1D0000-0x00007FFD9C204000-memory.dmp

                                                                                    Filesize

                                                                                    208KB

                                                                                  • memory/4608-982-0x00007FFD941D0000-0x00007FFD94703000-memory.dmp

                                                                                    Filesize

                                                                                    5.2MB

                                                                                  • memory/4608-980-0x00007FFDA64C0000-0x00007FFDA64CF000-memory.dmp

                                                                                    Filesize

                                                                                    60KB

                                                                                  • memory/4608-979-0x00007FFDA8970000-0x00007FFDA897D000-memory.dmp

                                                                                    Filesize

                                                                                    52KB

                                                                                  • memory/4608-718-0x00007FFD9ACE0000-0x00007FFD9AE5F000-memory.dmp

                                                                                    Filesize

                                                                                    1.5MB

                                                                                  • memory/4608-719-0x00007FFD9C090000-0x00007FFD9C0B5000-memory.dmp

                                                                                    Filesize

                                                                                    148KB

                                                                                  • memory/4608-1021-0x00007FFD96090000-0x00007FFD966F3000-memory.dmp

                                                                                    Filesize

                                                                                    6.4MB

                                                                                  • memory/4608-693-0x00007FFD9C3F0000-0x00007FFD9C41B000-memory.dmp

                                                                                    Filesize

                                                                                    172KB

                                                                                  • memory/4608-642-0x00007FFD96090000-0x00007FFD966F3000-memory.dmp

                                                                                    Filesize

                                                                                    6.4MB