Analysis

  • max time kernel
    22s
  • max time network
    17s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-01-2025 19:34

General

  • Target

    https://cdn.discordapp.com/attachments/1202973001197555773/1334353377261260831/Wave.exe?ex=679ce1ac&is=679b902c&hm=81ed019be41f3a6abc74e420ab9fa47670343073845a76707a48ee9a05a16e6b&

Malware Config

Signatures

  • Exela Stealer

    Exela Stealer is an open source stealer originally written in .NET and later transitioned to Python that was first observed in August 2023.

  • Exelastealer family
  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Downloads MZ/PE file 1 IoCs
  • Modifies Windows Firewall 2 TTPs 2 IoCs
  • Clipboard Data 1 TTPs 2 IoCs

    Adversaries may collect data stored in the clipboard from users copying information within or between applications.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 36 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Network Service Discovery 1 TTPs 2 IoCs

    Attempt to gather information on host's network.

  • Enumerates processes with tasklist 1 TTPs 4 IoCs
  • Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Detects Pyinstaller 1 IoCs
  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • Permission Groups Discovery: Local Groups 1 TTPs

    Attempt to find local system groups and permission settings.

  • System Network Configuration Discovery: Wi-Fi Discovery 1 TTPs 2 IoCs

    Adversaries may search for information about Wi-Fi networks, such as network names and passwords, on compromised systems.

  • System Network Connections Discovery 1 TTPs 1 IoCs

    Attempt to get a listing of network connections.

  • Collects information from the system 1 TTPs 1 IoCs

    Uses WMIC.exe to find detailed system information.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Kills process with taskkill 9 IoCs
  • NTFS ADS 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 37 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://cdn.discordapp.com/attachments/1202973001197555773/1334353377261260831/Wave.exe?ex=679ce1ac&is=679b902c&hm=81ed019be41f3a6abc74e420ab9fa47670343073845a76707a48ee9a05a16e6b&
    1⤵
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83e7946f8,0x7ff83e794708,0x7ff83e794718
      2⤵
        PID:2896
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,3796298180482955611,429765806697041599,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:2
        2⤵
          PID:2728
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,3796298180482955611,429765806697041599,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:3
          2⤵
          • Downloads MZ/PE file
          • Suspicious behavior: EnumeratesProcesses
          PID:3440
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,3796298180482955611,429765806697041599,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:8
          2⤵
            PID:2764
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,3796298180482955611,429765806697041599,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:1
            2⤵
              PID:3044
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,3796298180482955611,429765806697041599,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3452 /prefetch:1
              2⤵
                PID:3508
              • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,3796298180482955611,429765806697041599,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:8
                2⤵
                  PID:3988
                • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,3796298180482955611,429765806697041599,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:3944
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2212,3796298180482955611,429765806697041599,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5372 /prefetch:8
                  2⤵
                    PID:2536
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,3796298180482955611,429765806697041599,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
                    2⤵
                      PID:4380
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2212,3796298180482955611,429765806697041599,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5940 /prefetch:8
                      2⤵
                        PID:1376
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2212,3796298180482955611,429765806697041599,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6024 /prefetch:8
                        2⤵
                        • Suspicious behavior: EnumeratesProcesses
                        PID:3196
                      • C:\Users\Admin\Downloads\Wave.exe
                        "C:\Users\Admin\Downloads\Wave.exe"
                        2⤵
                        • Executes dropped EXE
                        PID:4532
                        • C:\Users\Admin\Downloads\Wave.exe
                          "C:\Users\Admin\Downloads\Wave.exe"
                          3⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          PID:4980
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c "ver"
                            4⤵
                              PID:2008
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                              4⤵
                                PID:2704
                                • C:\Windows\System32\Wbem\WMIC.exe
                                  wmic csproduct get uuid
                                  5⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4420
                              • C:\Windows\system32\cmd.exe
                                C:\Windows\system32\cmd.exe /c "tasklist"
                                4⤵
                                  PID:3580
                                  • C:\Windows\system32\tasklist.exe
                                    tasklist
                                    5⤵
                                    • Enumerates processes with tasklist
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:984
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c "attrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe""
                                  4⤵
                                  • Hide Artifacts: Hidden Files and Directories
                                  PID:3376
                                  • C:\Windows\system32\attrib.exe
                                    attrib +h +s "C:\Users\Admin\AppData\Local\ExelaUpdateService\Exela.exe"
                                    5⤵
                                    • Views/modifies file attributes
                                    PID:1372
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c "mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()""
                                  4⤵
                                    PID:780
                                    • C:\Windows\system32\mshta.exe
                                      mshta "javascript:var sh=new ActiveXObject('WScript.Shell'); sh.Popup('The Program can\x22t start because api-ms-win-crt-runtime-|l1-1-.dll is missing from your computer. Try reinstalling the program to fix this problem', 0, 'System Error', 0+16);close()"
                                      5⤵
                                        PID:4100
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /c "tasklist"
                                      4⤵
                                        PID:3144
                                        • C:\Windows\system32\tasklist.exe
                                          tasklist
                                          5⤵
                                          • Enumerates processes with tasklist
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1584
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c "taskkill /F /PID 1028"
                                        4⤵
                                          PID:1640
                                          • C:\Windows\system32\taskkill.exe
                                            taskkill /F /PID 1028
                                            5⤵
                                            • Kills process with taskkill
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4368
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /c "taskkill /F /PID 2896"
                                          4⤵
                                            PID:3060
                                            • C:\Windows\system32\taskkill.exe
                                              taskkill /F /PID 2896
                                              5⤵
                                              • Kills process with taskkill
                                              • Suspicious use of AdjustPrivilegeToken
                                              PID:3280
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c "taskkill /F /PID 2728"
                                            4⤵
                                              PID:3048
                                              • C:\Windows\system32\taskkill.exe
                                                taskkill /F /PID 2728
                                                5⤵
                                                • Kills process with taskkill
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2860
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c "taskkill /F /PID 3440"
                                              4⤵
                                                PID:1376
                                                • C:\Windows\system32\taskkill.exe
                                                  taskkill /F /PID 3440
                                                  5⤵
                                                  • Kills process with taskkill
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:692
                                              • C:\Windows\system32\cmd.exe
                                                C:\Windows\system32\cmd.exe /c "taskkill /F /PID 2764"
                                                4⤵
                                                  PID:1992
                                                  • C:\Windows\system32\taskkill.exe
                                                    taskkill /F /PID 2764
                                                    5⤵
                                                    • Kills process with taskkill
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4560
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /c "taskkill /F /PID 3044"
                                                  4⤵
                                                    PID:5008
                                                    • C:\Windows\system32\taskkill.exe
                                                      taskkill /F /PID 3044
                                                      5⤵
                                                      • Kills process with taskkill
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:4800
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\system32\cmd.exe /c "taskkill /F /PID 3508"
                                                    4⤵
                                                      PID:4340
                                                      • C:\Windows\system32\taskkill.exe
                                                        taskkill /F /PID 3508
                                                        5⤵
                                                        • Kills process with taskkill
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:336
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c "taskkill /F /PID 2536"
                                                      4⤵
                                                        PID:2936
                                                        • C:\Windows\system32\taskkill.exe
                                                          taskkill /F /PID 2536
                                                          5⤵
                                                          • Kills process with taskkill
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:4608
                                                      • C:\Windows\system32\cmd.exe
                                                        C:\Windows\system32\cmd.exe /c "taskkill /F /PID 4380"
                                                        4⤵
                                                          PID:2312
                                                          • C:\Windows\system32\taskkill.exe
                                                            taskkill /F /PID 4380
                                                            5⤵
                                                            • Kills process with taskkill
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:3628
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
                                                          4⤵
                                                            PID:1512
                                                            • C:\Windows\system32\cmd.exe
                                                              cmd.exe /c chcp
                                                              5⤵
                                                                PID:3376
                                                                • C:\Windows\system32\chcp.com
                                                                  chcp
                                                                  6⤵
                                                                    PID:2096
                                                              • C:\Windows\system32\cmd.exe
                                                                C:\Windows\system32\cmd.exe /c "cmd.exe /c chcp"
                                                                4⤵
                                                                  PID:3300
                                                                  • C:\Windows\system32\cmd.exe
                                                                    cmd.exe /c chcp
                                                                    5⤵
                                                                      PID:3796
                                                                      • C:\Windows\system32\chcp.com
                                                                        chcp
                                                                        6⤵
                                                                          PID:4556
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                      4⤵
                                                                        PID:1280
                                                                        • C:\Windows\system32\tasklist.exe
                                                                          tasklist /FO LIST
                                                                          5⤵
                                                                          • Enumerates processes with tasklist
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:960
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c "powershell.exe Get-Clipboard"
                                                                        4⤵
                                                                        • Clipboard Data
                                                                        PID:2812
                                                                        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                          powershell.exe Get-Clipboard
                                                                          5⤵
                                                                          • Clipboard Data
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:2728
                                                                      • C:\Windows\system32\cmd.exe
                                                                        C:\Windows\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config"
                                                                        4⤵
                                                                        • Network Service Discovery
                                                                        PID:1200
                                                                        • C:\Windows\system32\systeminfo.exe
                                                                          systeminfo
                                                                          5⤵
                                                                          • Gathers system information
                                                                          PID:4612
                                                                        • C:\Windows\system32\HOSTNAME.EXE
                                                                          hostname
                                                                          5⤵
                                                                            PID:116
                                                                          • C:\Windows\System32\Wbem\WMIC.exe
                                                                            wmic logicaldisk get caption,description,providername
                                                                            5⤵
                                                                            • Collects information from the system
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2976
                                                                          • C:\Windows\system32\net.exe
                                                                            net user
                                                                            5⤵
                                                                              PID:3296
                                                                              • C:\Windows\system32\net1.exe
                                                                                C:\Windows\system32\net1 user
                                                                                6⤵
                                                                                  PID:776
                                                                              • C:\Windows\system32\query.exe
                                                                                query user
                                                                                5⤵
                                                                                  PID:2188
                                                                                  • C:\Windows\system32\quser.exe
                                                                                    "C:\Windows\system32\quser.exe"
                                                                                    6⤵
                                                                                      PID:688
                                                                                  • C:\Windows\system32\net.exe
                                                                                    net localgroup
                                                                                    5⤵
                                                                                      PID:2288
                                                                                      • C:\Windows\system32\net1.exe
                                                                                        C:\Windows\system32\net1 localgroup
                                                                                        6⤵
                                                                                          PID:3604
                                                                                      • C:\Windows\system32\net.exe
                                                                                        net localgroup administrators
                                                                                        5⤵
                                                                                          PID:2660
                                                                                          • C:\Windows\system32\net1.exe
                                                                                            C:\Windows\system32\net1 localgroup administrators
                                                                                            6⤵
                                                                                              PID:4484
                                                                                          • C:\Windows\system32\net.exe
                                                                                            net user guest
                                                                                            5⤵
                                                                                              PID:2132
                                                                                              • C:\Windows\system32\net1.exe
                                                                                                C:\Windows\system32\net1 user guest
                                                                                                6⤵
                                                                                                  PID:3140
                                                                                              • C:\Windows\system32\net.exe
                                                                                                net user administrator
                                                                                                5⤵
                                                                                                  PID:4368
                                                                                                  • C:\Windows\system32\net1.exe
                                                                                                    C:\Windows\system32\net1 user administrator
                                                                                                    6⤵
                                                                                                      PID:2028
                                                                                                  • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                    wmic startup get caption,command
                                                                                                    5⤵
                                                                                                      PID:5096
                                                                                                    • C:\Windows\system32\tasklist.exe
                                                                                                      tasklist /svc
                                                                                                      5⤵
                                                                                                      • Enumerates processes with tasklist
                                                                                                      PID:212
                                                                                                    • C:\Windows\system32\ipconfig.exe
                                                                                                      ipconfig /all
                                                                                                      5⤵
                                                                                                      • Gathers network information
                                                                                                      PID:3944
                                                                                                    • C:\Windows\system32\ROUTE.EXE
                                                                                                      route print
                                                                                                      5⤵
                                                                                                        PID:1160
                                                                                                      • C:\Windows\system32\ARP.EXE
                                                                                                        arp -a
                                                                                                        5⤵
                                                                                                        • Network Service Discovery
                                                                                                        PID:4964
                                                                                                      • C:\Windows\system32\NETSTAT.EXE
                                                                                                        netstat -ano
                                                                                                        5⤵
                                                                                                        • System Network Connections Discovery
                                                                                                        • Gathers network information
                                                                                                        PID:3988
                                                                                                      • C:\Windows\system32\sc.exe
                                                                                                        sc query type= service state= all
                                                                                                        5⤵
                                                                                                        • Launches sc.exe
                                                                                                        PID:3496
                                                                                                      • C:\Windows\system32\netsh.exe
                                                                                                        netsh firewall show state
                                                                                                        5⤵
                                                                                                        • Modifies Windows Firewall
                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                        PID:5100
                                                                                                      • C:\Windows\system32\netsh.exe
                                                                                                        netsh firewall show config
                                                                                                        5⤵
                                                                                                        • Modifies Windows Firewall
                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                        PID:1192
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c "netsh wlan show profiles"
                                                                                                      4⤵
                                                                                                      • System Network Configuration Discovery: Wi-Fi Discovery
                                                                                                      PID:2732
                                                                                                      • C:\Windows\system32\netsh.exe
                                                                                                        netsh wlan show profiles
                                                                                                        5⤵
                                                                                                        • Event Triggered Execution: Netsh Helper DLL
                                                                                                        • System Network Configuration Discovery: Wi-Fi Discovery
                                                                                                        PID:4356
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                                                      4⤵
                                                                                                        PID:2564
                                                                                                        • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                          wmic csproduct get uuid
                                                                                                          5⤵
                                                                                                            PID:692
                                                                                                  • C:\Windows\System32\CompPkgSrv.exe
                                                                                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                    1⤵
                                                                                                      PID:3244
                                                                                                    • C:\Windows\System32\CompPkgSrv.exe
                                                                                                      C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                                                      1⤵
                                                                                                        PID:4356

                                                                                                      Network

                                                                                                      MITRE ATT&CK Enterprise v15

                                                                                                      Replay Monitor

                                                                                                      Loading Replay Monitor...

                                                                                                      Downloads

                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                        Filesize

                                                                                                        152B

                                                                                                        MD5

                                                                                                        6a53cceb7a396402c1eccd08dbe38a73

                                                                                                        SHA1

                                                                                                        96e06029b79791df1b1a0a7cef7508a5c44d13c4

                                                                                                        SHA256

                                                                                                        31c8ba2ce8a088515e4feff78968e8916c759331b7428421a990cc349a208b51

                                                                                                        SHA512

                                                                                                        bda381d092d0272a19350a66533ec0fac2efccfd26fc87695a8270eb3d4abec01483b31dfae75ba3f128623454d471c9e948c44df478edbdb6b5a15377637036

                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                                                        Filesize

                                                                                                        152B

                                                                                                        MD5

                                                                                                        a451e41e51facc395053e7b74c3490d0

                                                                                                        SHA1

                                                                                                        c866ac24af529f0265e99bd88529da46c9ff6dcc

                                                                                                        SHA256

                                                                                                        cc33bfdf9c856a2e9e9aa8eeddf9723a0396fad82b0dcae7a408bb4c84fdb584

                                                                                                        SHA512

                                                                                                        553489450d55d7adb9c859e521d0e46961490e54c533c826adc8c546ca0b51ecda82c159801bd060a291e724355c6d4fd2ee603ff65d4a15603f34f1472664fb

                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        89ba43f8c8a8250301c5c0864585e407

                                                                                                        SHA1

                                                                                                        71f973a3c1d986516f7d1c37526e19e4ffcbfa1d

                                                                                                        SHA256

                                                                                                        76722ff3a1c883f14f3c93f34b37329683cea0beabad5cd7a10ab8f2f522581b

                                                                                                        SHA512

                                                                                                        adbda61040c32ea6e6c3e71c3f3cafc44aa786224a5988ff4c0987c04ed15ad8a1d52700cb29e2af3ee7661a45892350c9fc96f7f81cbc14cbd6b201ddde76fe

                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                                                        Filesize

                                                                                                        6KB

                                                                                                        MD5

                                                                                                        b889103d6ddd58391e45480469d8457b

                                                                                                        SHA1

                                                                                                        0aaa9d4be8959579f95a617d7900f51821409585

                                                                                                        SHA256

                                                                                                        f7c6acae65ba950c6a9359f778b0a2cc35701ed3b5556929adf68a311c71f1fe

                                                                                                        SHA512

                                                                                                        270685215700904caf7c9c86131299d785310b3d2cc4794fbbcb5ebb5a4cf6433a97e33388217ebadea1e1d2cd8c55072cb2debed1c12738bb763388f769efe9

                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                        Filesize

                                                                                                        16B

                                                                                                        MD5

                                                                                                        46295cac801e5d4857d09837238a6394

                                                                                                        SHA1

                                                                                                        44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                        SHA256

                                                                                                        0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                        SHA512

                                                                                                        8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                                                        Filesize

                                                                                                        16B

                                                                                                        MD5

                                                                                                        206702161f94c5cd39fadd03f4014d98

                                                                                                        SHA1

                                                                                                        bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                                                                                        SHA256

                                                                                                        1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                                                                                        SHA512

                                                                                                        0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                                                        Filesize

                                                                                                        11KB

                                                                                                        MD5

                                                                                                        db4ad776ad75b147d75a24d24f0d2018

                                                                                                        SHA1

                                                                                                        07fe399edc3342ab9bea74560d2a2017862e7f73

                                                                                                        SHA256

                                                                                                        1ab0946563dd5febc373a14586a2575bd469c42c7e57aac54ae98013f295a1ef

                                                                                                        SHA512

                                                                                                        0c45252a6fa06fe8eeb87524d233079702d4f668336d20c1b53605561d708c4caf1245b8f09a661bd0810d1db10299ae7af029f0c661e3e0901d62a0921941a1

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\MSVCP140.dll

                                                                                                        Filesize

                                                                                                        552KB

                                                                                                        MD5

                                                                                                        cd0c37f1875b704f8eb08e397381ac16

                                                                                                        SHA1

                                                                                                        249d33c43e105a1c36ec6a24e5ef8dbc5f56b31b

                                                                                                        SHA256

                                                                                                        d86ac158123a245b927592c80cc020fea29c8c4addc144466c4625a00ca9c77a

                                                                                                        SHA512

                                                                                                        d60c56716399b417e1d9d7d739af13674c8572974f220a44e5e4e9ab0b0a23b8937bd0929eee9f03f20b7f74db008f70f9559a7eb66948b3afab5b96bdd1a6d5

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\VCRUNTIME140.dll

                                                                                                        Filesize

                                                                                                        106KB

                                                                                                        MD5

                                                                                                        870fea4e961e2fbd00110d3783e529be

                                                                                                        SHA1

                                                                                                        a948e65c6f73d7da4ffde4e8533c098a00cc7311

                                                                                                        SHA256

                                                                                                        76fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644

                                                                                                        SHA512

                                                                                                        0b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\VCRUNTIME140_1.dll

                                                                                                        Filesize

                                                                                                        48KB

                                                                                                        MD5

                                                                                                        bba9680bc310d8d25e97b12463196c92

                                                                                                        SHA1

                                                                                                        9a480c0cf9d377a4caedd4ea60e90fa79001f03a

                                                                                                        SHA256

                                                                                                        e0b66601cc28ecb171c3d4b7ac690c667f47da6b6183bff80604c84c00d265ab

                                                                                                        SHA512

                                                                                                        1575c786ac3324b17057255488da5f0bc13ad943ac9383656baf98db64d4ec6e453230de4cd26b535ce7e8b7d41a9f2d3f569a0eff5a84aeb1c2f9d6e3429739

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\_asyncio.pyd

                                                                                                        Filesize

                                                                                                        34KB

                                                                                                        MD5

                                                                                                        7d4f9a2b793e021f7e37b8448751ed4e

                                                                                                        SHA1

                                                                                                        0ea07b5024501aad5008655cfeae6d96b5da957a

                                                                                                        SHA256

                                                                                                        2293c1b6b0b901832a57a1c4dcb1265c9e92d21177195712c30632a7b63227d4

                                                                                                        SHA512

                                                                                                        af75452279c308c61c3e222a031a8201e47e8fe44c4e92cb7dab03d56c7e7e3e2a2c589f650c50e0b29e2df175d6f2ff50c8e5e589d17a124bf0a2e0d7886c26

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\_brotli.cp310-win_amd64.pyd

                                                                                                        Filesize

                                                                                                        291KB

                                                                                                        MD5

                                                                                                        277ad3ef0a1323a7e29d32f1fb4f0782

                                                                                                        SHA1

                                                                                                        3cbac1c280afb586fc79abcc24732b71700c4c16

                                                                                                        SHA256

                                                                                                        e4b450838c9408ed80f8bb8d4e165e8de204c73108af50c20c8b2b0c797cf219

                                                                                                        SHA512

                                                                                                        26a4446fccd2aa2b6c151ade640c154ac85be975dde0a1e5a6a857f1c505c7ac763e420fdce68892bcd70fb1bb5a24dff39f6751eefb7d01ba34de905e1db508

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\_bz2.pyd

                                                                                                        Filesize

                                                                                                        46KB

                                                                                                        MD5

                                                                                                        6250a28b9d0bfefc1254bd78ece7ae9f

                                                                                                        SHA1

                                                                                                        4b07c8e18d23c8ae9d92d7b8d39ae20bc447aecd

                                                                                                        SHA256

                                                                                                        7d43f7105aa4f856239235c67f61044493ee6f95ddf04533189bf5ea98073f0b

                                                                                                        SHA512

                                                                                                        6d0aa5c3f8f5b268b94341dfdd5afbe48f91f9aac143bf59f7f5e8ba6f54205b85ec527c53498ed8860fdff6a8d08e48ec4e1652eeab2d3c89aaaf3a14fcaaa7

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\_cffi_backend.cp310-win_amd64.pyd

                                                                                                        Filesize

                                                                                                        72KB

                                                                                                        MD5

                                                                                                        569d276da5bcb89d9e93b639d27d4c7c

                                                                                                        SHA1

                                                                                                        46ef90c9dbac45a89c384d26af1971fb780073bf

                                                                                                        SHA256

                                                                                                        e016f14f54a7907f0afe9970b5bfe9fb0ad043109d4446dd5e2910600e0b5a82

                                                                                                        SHA512

                                                                                                        1b883a41ecd35fe4a62d996f4a8c96e2ed9c7d16fd5a1515792f39524cacb9bdb314b5435644e52af0f1874b1a4ee1865492722649f59b51eb70085c0679d7b5

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\_ctypes.pyd

                                                                                                        Filesize

                                                                                                        56KB

                                                                                                        MD5

                                                                                                        4b90108fabdd64577a84313c765a2946

                                                                                                        SHA1

                                                                                                        245f4628683a3e18bb6f0d1c88aa26fb959ed258

                                                                                                        SHA256

                                                                                                        e1b634628839a45ab08913463e07b6b6b7fd502396d768f43b21da2875b506a1

                                                                                                        SHA512

                                                                                                        91fa069d7cf61c57faad6355f6fd46d702576c4342460dadcedfdcbc07cd9d84486734f0561fa5e1e01668b384c3c07dd779b332f77d0bb6fbdbb8c0cb5091bc

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\_decimal.pyd

                                                                                                        Filesize

                                                                                                        103KB

                                                                                                        MD5

                                                                                                        20985dc78dbd1992382354af5ca28988

                                                                                                        SHA1

                                                                                                        385a3e7a7654e5e4c686399f3a72b235e941e311

                                                                                                        SHA256

                                                                                                        f3620cac68595b8a8495ab044f19a1c89012f50d2fe571b7a1721485f7ff2e43

                                                                                                        SHA512

                                                                                                        61b8ecd2d12b3f785773b98d4bf4af0eb6eb2c61fbea6effb77ec24b2127e888d0ea5fdd8cc298484e0f770d70c87907048fc382faace8e0ca6b49ab106c89f8

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\_hashlib.pyd

                                                                                                        Filesize

                                                                                                        33KB

                                                                                                        MD5

                                                                                                        3b5530f497ff7c127383d0029e680c35

                                                                                                        SHA1

                                                                                                        fb5dc554bb9ff49622184cc16883a7567115c7ca

                                                                                                        SHA256

                                                                                                        5971fcc9758b7f4a12cde2190a323f35a34ab7f97bd8c39cc8f3335223102573

                                                                                                        SHA512

                                                                                                        12ced7ddb0352f8eca3c3cb7c7c2faaf08e617b2dd278d20008051fb6b564b17c3e9ecfa8b0ffe7674154ad533dfbbf1e802accd5e1aef12ece01368da06e85a

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\_lzma.pyd

                                                                                                        Filesize

                                                                                                        84KB

                                                                                                        MD5

                                                                                                        8edbeeccb6f3dbb09389d99d45db5542

                                                                                                        SHA1

                                                                                                        f7e7af2851a5bf22de79a24fe594b5c0435fca8a

                                                                                                        SHA256

                                                                                                        90701973be6b23703e495f6a145bae251a7bb066d3c5f398ec42694fd06a069f

                                                                                                        SHA512

                                                                                                        2a8bf60f2280b9a947578bd7fd49c3ace8e010a3d4b38e370edb511ea0e125df688bbac369d6a3cec9d285a1fa2ad2dac18a0ef30fda46e49a9440418581e501

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\_multiprocessing.pyd

                                                                                                        Filesize

                                                                                                        25KB

                                                                                                        MD5

                                                                                                        4fbc5fd5da9da74c04fe0374387b34d3

                                                                                                        SHA1

                                                                                                        1e9c98db0486f98fb7d8eb9fa57a949494b649b5

                                                                                                        SHA256

                                                                                                        b2347790c87052623710382d3178887f68a79618d6da5174909f46b169236950

                                                                                                        SHA512

                                                                                                        ce87d4512c2ab7c1ad7986e8e1fe790615ae39c7667d234dfc09026ee7e1518b3bfbf7974612811db0c3e5654b35b54e118e23e624bebe027a51d2c8f2a4652a

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\_overlapped.pyd

                                                                                                        Filesize

                                                                                                        30KB

                                                                                                        MD5

                                                                                                        5c1441f6ee11632183a83dac2d22853b

                                                                                                        SHA1

                                                                                                        eef732ff4bab9ea5c8fffb6a93c47cfc8e64dae2

                                                                                                        SHA256

                                                                                                        104e0b0e0e9fec9eb6438683296feeba298d5f23b02d2080577fc87ffec67acf

                                                                                                        SHA512

                                                                                                        e41d3433754a8a3d2c572bb7f3902c0d37cba2e6f3307f0e6dfed316a22b11ef7e52a73c30085fa89fcff603e4b76858abe761217c320e38fa2eb95d1777b595

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\_queue.pyd

                                                                                                        Filesize

                                                                                                        24KB

                                                                                                        MD5

                                                                                                        5c4c43763fb1a796134aa5734905c891

                                                                                                        SHA1

                                                                                                        44a5e1ae4806406a239129d77888bd87d291a410

                                                                                                        SHA256

                                                                                                        4edc80e7d331ba0e9338431d407157181190f995821d1cd24f7a7aa2422ece0c

                                                                                                        SHA512

                                                                                                        07bec7e4a85e76cfab2c21776b50ee2bd0454835fcb43b573dee757eca24cbeb4530784bae07de3be90820cee6d72023d9ded395d4f1a4931971db247dc1a71e

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\_socket.pyd

                                                                                                        Filesize

                                                                                                        41KB

                                                                                                        MD5

                                                                                                        53e72716073038c1dd1db65bfdb1254c

                                                                                                        SHA1

                                                                                                        7bf220a02a3b51aa51300b3a9ea7fa48358ca161

                                                                                                        SHA256

                                                                                                        e1fb6927ba2ed014d0ac750af0ee0bb3d49487dd6920848937259606e1e92e1d

                                                                                                        SHA512

                                                                                                        c10d91b6ec82402b0eb05dc31a4703c999f4988e88204b695e009fae5fdcc61e8a6dc4d2879ecf2babc030224048afd2f256b9e7f5c5b6f28762047813be0941

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\_sqlite3.pyd

                                                                                                        Filesize

                                                                                                        48KB

                                                                                                        MD5

                                                                                                        e7d68df8f65fbb0298a45519e2336f32

                                                                                                        SHA1

                                                                                                        ad3c84ad7eb75a61f287b1ba9fd2801567e39b6d

                                                                                                        SHA256

                                                                                                        2473ebaf52723c3751a12117ebbe974e50ecdaeb40b282a12ba4e6aa98492e79

                                                                                                        SHA512

                                                                                                        626204685e9b95310aba51be4a8abaf3b6e152fa35902f64f837303fc4011a4518ee393047ceb45bf377e9d965d169c92bfbb6673475150e159c59b7857ba03e

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\_ssl.pyd

                                                                                                        Filesize

                                                                                                        60KB

                                                                                                        MD5

                                                                                                        7e9d95ac47a2284706318656b4f711d3

                                                                                                        SHA1

                                                                                                        f085104709201c6e64635aeacf1da51599054e55

                                                                                                        SHA256

                                                                                                        38dcb3d0f217785b39c03d4c949dd1e04b70e9eade8a4ad83f026390684059c9

                                                                                                        SHA512

                                                                                                        294a5148d8fcddabd177b776617da7720d9876ac2a1cdf8dd7b9489f0f719600a634346cdfa07da66588de885b0a64d8cccde4d47edbf6305bd2af44ee209118

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\_uuid.pyd

                                                                                                        Filesize

                                                                                                        21KB

                                                                                                        MD5

                                                                                                        59cfd9669367517b384922b2485cb6a7

                                                                                                        SHA1

                                                                                                        1bd44298543204d61d4efd2cd3980ad01071360d

                                                                                                        SHA256

                                                                                                        e02bfad84786560b624efd56df55c88a4ffbd6c7cfc728bf68b6401aa10f849f

                                                                                                        SHA512

                                                                                                        d0dd041d8493c7c19db01ea8477981148726796ce2ab58d3193064123319bd5b68fd57871d1db0aaa08d07f78ab96a3d343051c33ffd406e96b921248ea32665

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\base_library.zip

                                                                                                        Filesize

                                                                                                        859KB

                                                                                                        MD5

                                                                                                        4253e18e2f977da6beaf3587db5b605c

                                                                                                        SHA1

                                                                                                        60eeed22b25bae022bdc5784352a49e441c6b301

                                                                                                        SHA256

                                                                                                        281e6f042e93f9de1c44c9917c8a54c0efbbe5fd97d9f46a65c8d702e144f4dd

                                                                                                        SHA512

                                                                                                        2f474078f48739660cf4a770544c52dcd00d2951c3ad03549f80951f57c425cda5979d56e9482dd05541de851c33a27658da8b4bccde19276ab43108d0a30163

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\libcrypto-1_1.dll

                                                                                                        Filesize

                                                                                                        1.1MB

                                                                                                        MD5

                                                                                                        86cfc84f8407ab1be6cc64a9702882ef

                                                                                                        SHA1

                                                                                                        86f3c502ed64df2a5e10b085103c2ffc9e3a4130

                                                                                                        SHA256

                                                                                                        11b89cc5531b2a6b89fbbb406ebe8fb01f0bf789e672131b0354e10f9e091307

                                                                                                        SHA512

                                                                                                        b33f59497127cb1b4c1781693380576187c562563a9e367ce8abc14c97c51053a28af559cdd8bd66181012083e562c8a8771e3d46adeba269a848153a8e9173c

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\libffi-7.dll

                                                                                                        Filesize

                                                                                                        23KB

                                                                                                        MD5

                                                                                                        d50ebf567149ead9d88933561cb87d09

                                                                                                        SHA1

                                                                                                        171df40e4187ebbfdf9aa1d76a33f769fb8a35ed

                                                                                                        SHA256

                                                                                                        6aa8e12ce7c8ad52dd2e3fabeb38a726447849669c084ea63d8e322a193033af

                                                                                                        SHA512

                                                                                                        7bcc9d6d3a097333e1e4b2b23c81ea1b5db7dbdc5d9d62ebaffb0fdfb6cfe86161520ac14dc835d1939be22b9f342531f48da70f765a60b8e2c3d7b9983021de

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\libssl-1_1.dll

                                                                                                        Filesize

                                                                                                        203KB

                                                                                                        MD5

                                                                                                        6cd33578bc5629930329ca3303f0fae1

                                                                                                        SHA1

                                                                                                        f2f8e3248a72f98d27f0cfa0010e32175a18487f

                                                                                                        SHA256

                                                                                                        4150ee603ad2da7a6cb6a895cb5bd928e3a99af7e73c604de1fc224e0809fdb0

                                                                                                        SHA512

                                                                                                        c236a6ccc8577c85509d378c1ef014621cab6f6f4aa26796ff32d8eec8e98ded2e55d358a7d236594f7a48646dc2a6bf25b42a37aed549440d52873ebca4713e

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\multidict\_multidict.cp310-win_amd64.pyd

                                                                                                        Filesize

                                                                                                        20KB

                                                                                                        MD5

                                                                                                        dba01ddfe41784191780e50534b7b86b

                                                                                                        SHA1

                                                                                                        64e834d0e457252f6deba67843626804d6343a41

                                                                                                        SHA256

                                                                                                        1fc13691e104e56fb0b742288d4aa943b907db3da6848e1b92904a1aa9b89187

                                                                                                        SHA512

                                                                                                        13046e44a6e0df896789d17427f9c05c229cbabfb0414e3c6b78637701a316953efa507e40519c760ea762e2e2c90714fd72e14e7bd949094c08d70bf515c2ff

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\pyexpat.pyd

                                                                                                        Filesize

                                                                                                        86KB

                                                                                                        MD5

                                                                                                        46331749084f98bcfe8631d74c5e038f

                                                                                                        SHA1

                                                                                                        5e5510f7a4d03f10d979e0d6a0d2a6f0e53ca347

                                                                                                        SHA256

                                                                                                        21cc4b9ccd69d08d7c1068b1f004ae9454f7ea0a322801860faf0e6f4a24a3df

                                                                                                        SHA512

                                                                                                        edd39ce2d927fb6700a86db07f4f56cab897ef91a320f3e5ecb542ea1be6888dd27a08008e5fa1df3765b0c82d1046a23c8d59e76d11f4e6449d4d6826879589

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\python3.dll

                                                                                                        Filesize

                                                                                                        63KB

                                                                                                        MD5

                                                                                                        c17b7a4b853827f538576f4c3521c653

                                                                                                        SHA1

                                                                                                        6115047d02fbbad4ff32afb4ebd439f5d529485a

                                                                                                        SHA256

                                                                                                        d21e60f3dfbf2bab0cc8a06656721fa3347f026df10297674fc635ebf9559a68

                                                                                                        SHA512

                                                                                                        8e08e702d69df6840781d174c4565e14a28022b40f650fda88d60172be2d4ffd96a3e9426d20718c54072ca0da27e0455cc0394c098b75e062a27559234a3df7

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\python310.dll

                                                                                                        Filesize

                                                                                                        1.4MB

                                                                                                        MD5

                                                                                                        fc7bd515b12e537a39dc93a09b3eaad6

                                                                                                        SHA1

                                                                                                        96f5d4b0967372553cb106539c5566bc184f6167

                                                                                                        SHA256

                                                                                                        461e008b7cdf034f99a566671b87849772873a175aefec6ed00732976f5c4164

                                                                                                        SHA512

                                                                                                        a8433d5b403f898e4eeebd72fce08ebad066ca60aeb0b70e2ae78377babc2acbbae2ac91ab20f813cce4b1dc58c2ad6b3868f18cc8ac0fe7be2bff020eb73122

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\select.pyd

                                                                                                        Filesize

                                                                                                        24KB

                                                                                                        MD5

                                                                                                        3797a47a60b606e25348c67043874fe8

                                                                                                        SHA1

                                                                                                        63a33fedffd52190236a6acd0fc5d9d491e3ac45

                                                                                                        SHA256

                                                                                                        312e9b01d1632840983e8533d1685a64fb87e4538f724a7a59a71b1ba148bbac

                                                                                                        SHA512

                                                                                                        3eb7599825b7b21aaab05e420dd16d4a8eaa21652d232f6e4ede213a232b701401556e44df73cfa20ae855d1adc28304b52d42367b74ebd8e96c2e3d9a9b93e2

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\sqlite3.dll

                                                                                                        Filesize

                                                                                                        608KB

                                                                                                        MD5

                                                                                                        6a3a34c9c67efd6c17d44292e8db8fad

                                                                                                        SHA1

                                                                                                        339b1e514d60d8370eaec1e2f2b71cead999f970

                                                                                                        SHA256

                                                                                                        7b0e840165d65f0f5285476467e4c154c4d936613966b84948110a4614b9cad9

                                                                                                        SHA512

                                                                                                        6f2a1b670d28762745f0d3b961a331cbbb0dec244f8798734b911b3a3bc9519c73a3b26f1e1117725f6f1e880e57cadb562a1450659bca1aae353f6b9575d7f5

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\unicodedata.pyd

                                                                                                        Filesize

                                                                                                        287KB

                                                                                                        MD5

                                                                                                        fed35db31377d515d198e5e446498be2

                                                                                                        SHA1

                                                                                                        62e388d17e17208ea0e881ccd96c75b7b1fbc5f7

                                                                                                        SHA256

                                                                                                        af3cdc9a2a1d923be67244429867a3c5c70835249e3573a03b98d08d148fe24b

                                                                                                        SHA512

                                                                                                        0985528cb0289086ec895e21a8947e04f732d5660460f2e7fa8668bd441c891438781c808bcea9294f348720e3752c10ea65363371f7e75ea48600d016bab72a

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\_MEI45322\yarl\_quoting_c.cp310-win_amd64.pyd

                                                                                                        Filesize

                                                                                                        31KB

                                                                                                        MD5

                                                                                                        e38fde2d8395e72458dd08956598279e

                                                                                                        SHA1

                                                                                                        1fc9f0562d9012d3cfcf8ac8cff6854d7f35e333

                                                                                                        SHA256

                                                                                                        248cd49446e0e0939a03ffe6cc8b83885bfc9b285dbaff90bc10ac6334d10f54

                                                                                                        SHA512

                                                                                                        bd8428f4f67de23d65c86b8901a9351fd5fbd81bd980ad3277a1520eb21723287f2364dd13fbcf5454bad41947d37b614a245fc204d9a69c0dbfca1ad78329f2

                                                                                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_osxu50xr.m4m.ps1

                                                                                                        Filesize

                                                                                                        60B

                                                                                                        MD5

                                                                                                        d17fe0a3f47be24a6453e9ef58c94641

                                                                                                        SHA1

                                                                                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                                                        SHA256

                                                                                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                                                        SHA512

                                                                                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                                                      • C:\Users\Admin\Downloads\Unconfirmed 171171.crdownload

                                                                                                        Filesize

                                                                                                        9.8MB

                                                                                                        MD5

                                                                                                        708932216a4a65b3e560893a115673f2

                                                                                                        SHA1

                                                                                                        e9aeef34258854948f50f1c6bbd8eb69772d0e59

                                                                                                        SHA256

                                                                                                        a3d7cd217684a58df277f072e1b7e1a4e00448f1b7530fdae13af3903d1327a5

                                                                                                        SHA512

                                                                                                        78ce6826fa7d3d561ce69d395b62e5178ab7333a510652b614fa7864ac61bf3901a07d49b39bd43968f5f54ef6f04fd9c6aa7af7a435d05c1a3833bf61272992

                                                                                                      • memory/2728-272-0x000001FD68060000-0x000001FD68082000-memory.dmp

                                                                                                        Filesize

                                                                                                        136KB

                                                                                                      • memory/4980-173-0x00007FF829230000-0x00007FF8292E8000-memory.dmp

                                                                                                        Filesize

                                                                                                        736KB

                                                                                                      • memory/4980-208-0x00007FF827E00000-0x00007FF827F93000-memory.dmp

                                                                                                        Filesize

                                                                                                        1.6MB

                                                                                                      • memory/4980-206-0x00007FF83AB70000-0x00007FF83AB7E000-memory.dmp

                                                                                                        Filesize

                                                                                                        56KB

                                                                                                      • memory/4980-159-0x00007FF8319A0000-0x00007FF8319BF000-memory.dmp

                                                                                                        Filesize

                                                                                                        124KB

                                                                                                      • memory/4980-161-0x00007FF8292F0000-0x00007FF829461000-memory.dmp

                                                                                                        Filesize

                                                                                                        1.4MB

                                                                                                      • memory/4980-172-0x00007FF8283B0000-0x00007FF82881E000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.4MB

                                                                                                      • memory/4980-214-0x00007FF8319A0000-0x00007FF8319BF000-memory.dmp

                                                                                                        Filesize

                                                                                                        124KB

                                                                                                      • memory/4980-215-0x00007FF83AAA0000-0x00007FF83AAAA000-memory.dmp

                                                                                                        Filesize

                                                                                                        40KB

                                                                                                      • memory/4980-213-0x00007FF828DD0000-0x00007FF828E09000-memory.dmp

                                                                                                        Filesize

                                                                                                        228KB

                                                                                                      • memory/4980-212-0x00007FF8279C0000-0x00007FF827D97000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.8MB

                                                                                                      • memory/4980-209-0x00007FF827DA0000-0x00007FF827DF3000-memory.dmp

                                                                                                        Filesize

                                                                                                        332KB

                                                                                                      • memory/4980-168-0x00007FF831970000-0x00007FF83199E000-memory.dmp

                                                                                                        Filesize

                                                                                                        184KB

                                                                                                      • memory/4980-188-0x00007FF828EF0000-0x00007FF829008000-memory.dmp

                                                                                                        Filesize

                                                                                                        1.1MB

                                                                                                      • memory/4980-189-0x00007FF8312A0000-0x00007FF8312BB000-memory.dmp

                                                                                                        Filesize

                                                                                                        108KB

                                                                                                      • memory/4980-157-0x00007FF836090000-0x00007FF8360BD000-memory.dmp

                                                                                                        Filesize

                                                                                                        180KB

                                                                                                      • memory/4980-190-0x00007FF831950000-0x00007FF831965000-memory.dmp

                                                                                                        Filesize

                                                                                                        84KB

                                                                                                      • memory/4980-192-0x00007FF83A4C0000-0x00007FF83A4D9000-memory.dmp

                                                                                                        Filesize

                                                                                                        100KB

                                                                                                      • memory/4980-155-0x00007FF839D60000-0x00007FF839D79000-memory.dmp

                                                                                                        Filesize

                                                                                                        100KB

                                                                                                      • memory/4980-195-0x00007FF828E10000-0x00007FF828EEF000-memory.dmp

                                                                                                        Filesize

                                                                                                        892KB

                                                                                                      • memory/4980-153-0x00007FF83C120000-0x00007FF83C12D000-memory.dmp

                                                                                                        Filesize

                                                                                                        52KB

                                                                                                      • memory/4980-194-0x00007FF82BD80000-0x00007FF82BD95000-memory.dmp

                                                                                                        Filesize

                                                                                                        84KB

                                                                                                      • memory/4980-193-0x00007FF82BDA0000-0x00007FF82BDB3000-memory.dmp

                                                                                                        Filesize

                                                                                                        76KB

                                                                                                      • memory/4980-191-0x00007FF83E380000-0x00007FF83E38F000-memory.dmp

                                                                                                        Filesize

                                                                                                        60KB

                                                                                                      • memory/4980-174-0x00000182AED10000-0x00000182AF085000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.5MB

                                                                                                      • memory/4980-297-0x00007FF8292F0000-0x00007FF829461000-memory.dmp

                                                                                                        Filesize

                                                                                                        1.4MB

                                                                                                      • memory/4980-183-0x00007FF828030000-0x00007FF8283A5000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.5MB

                                                                                                      • memory/4980-207-0x00007FF829D30000-0x00007FF829D46000-memory.dmp

                                                                                                        Filesize

                                                                                                        88KB

                                                                                                      • memory/4980-151-0x00007FF83A4C0000-0x00007FF83A4D9000-memory.dmp

                                                                                                        Filesize

                                                                                                        100KB

                                                                                                      • memory/4980-127-0x00007FF83E380000-0x00007FF83E38F000-memory.dmp

                                                                                                        Filesize

                                                                                                        60KB

                                                                                                      • memory/4980-117-0x00007FF8283B0000-0x00007FF82881E000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.4MB

                                                                                                      • memory/4980-184-0x00007FF836750000-0x00007FF836774000-memory.dmp

                                                                                                        Filesize

                                                                                                        144KB

                                                                                                      • memory/4980-125-0x00007FF836750000-0x00007FF836774000-memory.dmp

                                                                                                        Filesize

                                                                                                        144KB

                                                                                                      • memory/4980-185-0x00007FF83BA60000-0x00007FF83BA70000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/4980-226-0x00007FF831970000-0x00007FF83199E000-memory.dmp

                                                                                                        Filesize

                                                                                                        184KB

                                                                                                      • memory/4980-230-0x00007FF829230000-0x00007FF8292E8000-memory.dmp

                                                                                                        Filesize

                                                                                                        736KB

                                                                                                      • memory/4980-231-0x00000182AED10000-0x00000182AF085000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.5MB

                                                                                                      • memory/4980-232-0x00007FF828030000-0x00007FF8283A5000-memory.dmp

                                                                                                        Filesize

                                                                                                        3.5MB

                                                                                                      • memory/4980-268-0x00007FF83BA60000-0x00007FF83BA70000-memory.dmp

                                                                                                        Filesize

                                                                                                        64KB

                                                                                                      • memory/4980-269-0x00007FF843970000-0x00007FF84397D000-memory.dmp

                                                                                                        Filesize

                                                                                                        52KB

                                                                                                      • memory/4980-186-0x00007FF8312E0000-0x00007FF8312F4000-memory.dmp

                                                                                                        Filesize

                                                                                                        80KB

                                                                                                      • memory/4980-187-0x00007FF8312C0000-0x00007FF8312D4000-memory.dmp

                                                                                                        Filesize

                                                                                                        80KB

                                                                                                      • memory/4980-286-0x00007FF831950000-0x00007FF831965000-memory.dmp

                                                                                                        Filesize

                                                                                                        84KB

                                                                                                      • memory/4980-287-0x00007FF82BDA0000-0x00007FF82BDB3000-memory.dmp

                                                                                                        Filesize

                                                                                                        76KB

                                                                                                      • memory/4980-288-0x00007FF82BD80000-0x00007FF82BD95000-memory.dmp

                                                                                                        Filesize

                                                                                                        84KB

                                                                                                      • memory/4980-289-0x00007FF8283B0000-0x00007FF82881E000-memory.dmp

                                                                                                        Filesize

                                                                                                        4.4MB

                                                                                                      • memory/4980-320-0x00007FF8291F0000-0x00007FF82922F000-memory.dmp

                                                                                                        Filesize

                                                                                                        252KB

                                                                                                      • memory/4980-319-0x00007FF828E10000-0x00007FF828EEF000-memory.dmp

                                                                                                        Filesize

                                                                                                        892KB

                                                                                                      • memory/4980-306-0x00007FF8312A0000-0x00007FF8312BB000-memory.dmp

                                                                                                        Filesize

                                                                                                        108KB

                                                                                                      • memory/4980-301-0x00007FF831950000-0x00007FF831965000-memory.dmp

                                                                                                        Filesize

                                                                                                        84KB

                                                                                                      • memory/4980-205-0x00007FF8291F0000-0x00007FF82922F000-memory.dmp

                                                                                                        Filesize

                                                                                                        252KB

                                                                                                      • memory/4980-296-0x00007FF8319A0000-0x00007FF8319BF000-memory.dmp

                                                                                                        Filesize

                                                                                                        124KB

                                                                                                      • memory/4980-290-0x00007FF836750000-0x00007FF836774000-memory.dmp

                                                                                                        Filesize

                                                                                                        144KB