Malware Analysis Report

2024-11-30 11:45

Sample ID 231008-sjqyhadd6t
Target A92.exe
SHA256 e4852aad5c54e48f680657770df676ed4e2deddf18e065738c22408afcd8f9ad
Tags
persistence spyware stealer upx pyinstaller pysilon
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

e4852aad5c54e48f680657770df676ed4e2deddf18e065738c22408afcd8f9ad

Threat Level: Known bad

The file A92.exe was found to be: Known bad.

Malicious Activity Summary

persistence spyware stealer upx pyinstaller pysilon

Detect Pysilon

Pysilon family

Enumerates VirtualBox DLL files

Loads dropped DLL

Executes dropped EXE

Reads user/profile data of web browsers

UPX packed file

Adds Run key to start application

Looks up external IP address via web service

Legitimate hosting services abused for malware hosting/C2

Unsigned PE

Detects Pyinstaller

Suspicious use of SendNotifyMessage

Suspicious use of WriteProcessMemory

Kills process with taskkill

Suspicious use of AdjustPrivilegeToken

Suspicious use of FindShellTrayWindow

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Modifies data under HKEY_USERS

Gathers system information

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-10-08 15:09

Signatures

Detect Pysilon

Description Indicator Process Target
N/A N/A N/A N/A

Pysilon family

pysilon

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-10-08 15:09

Reported

2023-10-08 15:12

Platform

win10v2004-20230915-en

Max time kernel

146s

Max time network

161s

Command Line

"C:\Users\Admin\AppData\Local\Temp\A92.exe"

Signatures

Enumerates VirtualBox DLL files

Description Indicator Process Target
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\Runtime_Broker\Runtime Broker.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\Runtime_Broker\Runtime Broker.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe N/A
N/A N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A

Reads user/profile data of web browsers

spyware stealer

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-919254492-3979293997-764407192-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Runtime Broker = "C:\\Users\\Admin\\Runtime_Broker\\Runtime Broker.exe" C:\Users\Admin\AppData\Local\Temp\A92.exe N/A

Legitimate hosting services abused for malware hosting/C2

Looks up external IP address via web service

Description Indicator Process Target
N/A ident.me N/A N/A
N/A ident.me N/A N/A

Enumerates system info in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Gathers system information

Description Indicator Process Target
N/A N/A C:\Windows\system32\systeminfo.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = a6d8ff0076b9ed00429ce3000078d700005a9e000042750000264200f7630c00 C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292311040" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" C:\Windows\system32\LogonUI.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent C:\Windows\system32\LogonUI.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History C:\Windows\system32\LogonUI.exe N/A
Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4288567808" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365271" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365271" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "114" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" C:\Windows\system32\LogonUI.exe N/A
Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292311040" C:\Windows\system32\LogonUI.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe N/A
N/A N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe N/A
N/A N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe N/A
N/A N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe N/A
N/A N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe N/A
N/A N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe N/A
N/A N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe N/A
N/A N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe N/A
N/A N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe N/A
N/A N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe N/A
N/A N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\A92.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe N/A
N/A N/A C:\Windows\system32\LogonUI.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1180 wrote to memory of 1384 N/A C:\Users\Admin\AppData\Local\Temp\A92.exe C:\Users\Admin\AppData\Local\Temp\A92.exe
PID 1180 wrote to memory of 1384 N/A C:\Users\Admin\AppData\Local\Temp\A92.exe C:\Users\Admin\AppData\Local\Temp\A92.exe
PID 1384 wrote to memory of 2892 N/A C:\Users\Admin\AppData\Local\Temp\A92.exe C:\Windows\system32\cmd.exe
PID 1384 wrote to memory of 2892 N/A C:\Users\Admin\AppData\Local\Temp\A92.exe C:\Windows\system32\cmd.exe
PID 1384 wrote to memory of 2284 N/A C:\Users\Admin\AppData\Local\Temp\A92.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1384 wrote to memory of 2284 N/A C:\Users\Admin\AppData\Local\Temp\A92.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1384 wrote to memory of 4224 N/A C:\Users\Admin\AppData\Local\Temp\A92.exe C:\Windows\system32\cmd.exe
PID 1384 wrote to memory of 4224 N/A C:\Users\Admin\AppData\Local\Temp\A92.exe C:\Windows\system32\cmd.exe
PID 4224 wrote to memory of 4304 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\Runtime_Broker\Runtime Broker.exe
PID 4224 wrote to memory of 4304 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\Runtime_Broker\Runtime Broker.exe
PID 4224 wrote to memory of 1532 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 4224 wrote to memory of 1532 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 4304 wrote to memory of 4168 N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe C:\Users\Admin\Runtime_Broker\Runtime Broker.exe
PID 4304 wrote to memory of 4168 N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe C:\Users\Admin\Runtime_Broker\Runtime Broker.exe
PID 4168 wrote to memory of 2448 N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe C:\Windows\system32\cmd.exe
PID 4168 wrote to memory of 2448 N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe C:\Windows\system32\cmd.exe
PID 4168 wrote to memory of 3688 N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4168 wrote to memory of 3688 N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4168 wrote to memory of 4068 N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe C:\Windows\system32\cmd.exe
PID 4168 wrote to memory of 4068 N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe C:\Windows\system32\cmd.exe
PID 4068 wrote to memory of 2976 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 4068 wrote to memory of 2976 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 4168 wrote to memory of 1680 N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe C:\Windows\system32\cmd.exe
PID 4168 wrote to memory of 1680 N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe C:\Windows\system32\cmd.exe
PID 1680 wrote to memory of 1552 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\systeminfo.exe
PID 1680 wrote to memory of 1552 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\systeminfo.exe
PID 4168 wrote to memory of 744 N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe C:\Windows\system32\cmd.exe
PID 4168 wrote to memory of 744 N/A C:\Users\Admin\Runtime_Broker\Runtime Broker.exe C:\Windows\system32\cmd.exe
PID 744 wrote to memory of 2212 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 744 wrote to memory of 2212 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2156 wrote to memory of 216 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 216 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 2156 wrote to memory of 4008 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Processes

C:\Users\Admin\AppData\Local\Temp\A92.exe

"C:\Users\Admin\AppData\Local\Temp\A92.exe"

C:\Users\Admin\AppData\Local\Temp\A92.exe

"C:\Users\Admin\AppData\Local\Temp\A92.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x504 0x4e8

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Runtime_Broker\""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\Runtime_Broker\activate.bat

C:\Users\Admin\Runtime_Broker\Runtime Broker.exe

"Runtime Broker.exe"

C:\Windows\system32\taskkill.exe

taskkill /f /im "A92.exe"

C:\Users\Admin\Runtime_Broker\Runtime Broker.exe

"Runtime Broker.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Runtime_Broker\""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"

C:\Windows\System32\Wbem\WMIC.exe

wmic csproduct get uuid

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "systeminfo"

C:\Windows\system32\systeminfo.exe

systeminfo

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"

C:\Windows\System32\Wbem\WMIC.exe

wmic csproduct get uuid

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7ff8cfc59758,0x7ff8cfc59768,0x7ff8cfc59778

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 --field-trial-handle=2036,i,11301630039673947102,13846921100604437739,131072 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1916 --field-trial-handle=2036,i,11301630039673947102,13846921100604437739,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2160 --field-trial-handle=2036,i,11301630039673947102,13846921100604437739,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2900 --field-trial-handle=2036,i,11301630039673947102,13846921100604437739,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2908 --field-trial-handle=2036,i,11301630039673947102,13846921100604437739,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4612 --field-trial-handle=2036,i,11301630039673947102,13846921100604437739,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --enable-chrome-cart --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4556 --field-trial-handle=2036,i,11301630039673947102,13846921100604437739,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4608 --field-trial-handle=2036,i,11301630039673947102,13846921100604437739,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3980 --field-trial-handle=2036,i,11301630039673947102,13846921100604437739,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5160 --field-trial-handle=2036,i,11301630039673947102,13846921100604437739,131072 /prefetch:8

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "del C:\Users\Admin\Runtime_Broker\ss.png"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "shutdown /p"

C:\Windows\system32\shutdown.exe

shutdown /p

C:\Windows\system32\LogonUI.exe

"LogonUI.exe" /flags:0x4 /state0:0xa3965855 /state1:0x41c64e6d

C:\Windows\system32\rundll32.exe

C:\Windows\system32\rundll32.exe C:\Windows\system32\PcaSvc.dll,PcaPatchSdbTask

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 2.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 1.208.79.178.in-addr.arpa udp
US 8.8.8.8:53 108.211.229.192.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 75.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
US 8.8.8.8:53 43.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 120.208.253.8.in-addr.arpa udp
US 8.8.8.8:53 126.24.238.8.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
US 8.8.8.8:53 discord.com udp
US 162.159.138.232:443 discord.com tcp
US 8.8.8.8:53 232.138.159.162.in-addr.arpa udp
US 8.8.8.8:53 gateway.discord.gg udp
US 162.159.130.234:443 gateway.discord.gg tcp
US 8.8.8.8:53 234.130.159.162.in-addr.arpa udp
US 8.8.8.8:53 pastebin.com udp
US 104.20.67.143:443 pastebin.com tcp
US 162.159.138.232:443 discord.com tcp
US 162.159.130.234:443 gateway.discord.gg tcp
US 8.8.8.8:53 143.67.20.104.in-addr.arpa udp
US 8.8.8.8:53 ident.me udp
DE 49.12.234.183:443 ident.me tcp
US 8.8.8.8:53 ipv4.lafibre.info udp
NL 51.158.154.169:443 ipv4.lafibre.info tcp
US 8.8.8.8:53 183.234.12.49.in-addr.arpa udp
US 8.8.8.8:53 169.154.158.51.in-addr.arpa udp
US 8.8.8.8:53 10.36.251.142.in-addr.arpa udp
US 8.8.8.8:53 196.168.217.172.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 clients2.google.com udp
NL 142.251.36.46:443 clients2.google.com udp
NL 142.251.36.46:443 clients2.google.com tcp
US 8.8.8.8:53 46.36.251.142.in-addr.arpa udp
NL 142.251.36.46:443 clients2.google.com tcp
NL 142.251.36.46:443 clients2.google.com tcp
US 162.159.138.232:443 discord.com tcp
US 8.8.8.8:53 67.112.168.52.in-addr.arpa udp
N/A 127.0.0.1:63855 tcp
N/A 127.0.0.1:63866 tcp
US 162.159.138.232:443 discord.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI11802\python311.dll

MD5 1e76961ca11f929e4213fca8272d0194
SHA1 e52763b7ba970c3b14554065f8c2404112f53596
SHA256 8a0c27f9e5b2efd54e41d7e7067d7cb1c6d23bae5229f6d750f89568566227b0
SHA512 ec6ed913e0142a98cd7f6adced5671334ec6545e583284ae10627162b199e55867d7cf28efeaadce9862c978b01c234a850288e529d2d3e2ac7dbbb99c6cde9b

C:\Users\Admin\AppData\Local\Temp\_MEI11802\VCRUNTIME140.dll

MD5 870fea4e961e2fbd00110d3783e529be
SHA1 a948e65c6f73d7da4ffde4e8533c098a00cc7311
SHA256 76fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644
SHA512 0b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88

C:\Users\Admin\AppData\Local\Temp\_MEI11802\VCRUNTIME140.dll

MD5 870fea4e961e2fbd00110d3783e529be
SHA1 a948e65c6f73d7da4ffde4e8533c098a00cc7311
SHA256 76fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644
SHA512 0b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88

C:\Users\Admin\AppData\Local\Temp\_MEI11802\python311.dll

MD5 1e76961ca11f929e4213fca8272d0194
SHA1 e52763b7ba970c3b14554065f8c2404112f53596
SHA256 8a0c27f9e5b2efd54e41d7e7067d7cb1c6d23bae5229f6d750f89568566227b0
SHA512 ec6ed913e0142a98cd7f6adced5671334ec6545e583284ae10627162b199e55867d7cf28efeaadce9862c978b01c234a850288e529d2d3e2ac7dbbb99c6cde9b

memory/1384-1251-0x00007FF8D48C0000-0x00007FF8D4EAA000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI11802\base_library.zip

MD5 2efeab81308c47666dfffc980b9fe559
SHA1 8fbb7bbdb97e888220df45cc5732595961dbe067
SHA256 a20eeb4ba2069863d40e4feab2136ca5be183887b6368e32f1a12c780a5af1ad
SHA512 39b030931a7a5940edc40607dcc9da7ca1bf479e34ebf45a1623a67d38b98eb4337b047cc8261038d27ed9e9d6f2b120abbf140c6c90d866cdba0a4c810ac32c

C:\Users\Admin\AppData\Local\Temp\_MEI11802\python3.dll

MD5 2ad3039bd03669f99e948f449d9f778b
SHA1 dae8f661990c57adb171667b9206c8d84c50ecad
SHA256 852b901e17022c437f8fc3039a5af2ee80c5d509c9ef5f512041af17c48fcd61
SHA512 8ffeaa6cd491d7068f9176fd628002c84256802bd47a17742909f561ca1da6a2e7c600e17cd983063e8a93c2bbe9b981bd43e55443d28e32dfb504d7f1e120c0

C:\Users\Admin\AppData\Local\Temp\_MEI11802\libjpeg-9.dll

MD5 6e67e46f957f50215b7e68c9091db53f
SHA1 e969fa4858351c95c337352dd0578fe5a83403f0
SHA256 24b25fe9ebe303496973c4d11144b053a5f5a03eabf53f9d8eab0c15fdbfbffe
SHA512 86af5560269ef21490f5343ea3e0522f35e271d42e64f61a2f05471302856de79d34bf00658e1667d7145af48667627fa3897bca2fc479928ab9a62ecba81396

memory/1384-1304-0x00007FF8E5190000-0x00007FF8E519F000-memory.dmp

memory/1384-1307-0x00007FF8E4B30000-0x00007FF8E4B49000-memory.dmp

memory/1384-1308-0x00007FF8E4B00000-0x00007FF8E4B2D000-memory.dmp

memory/1384-1310-0x00007FF8E4AE0000-0x00007FF8E4AF4000-memory.dmp

memory/1384-1309-0x00007FF8D4540000-0x00007FF8D48B5000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI11802\libcrypto-1_1.dll

MD5 e5aecaf59c67d6dd7c7979dfb49ed3b0
SHA1 b0a292065e1b3875f015277b90d183b875451450
SHA256 9d2257d0de8172bcc8f2dba431eb91bd5b8ac5a9cbe998f1dcac0fac818800b1
SHA512 145eaa969a1a14686ab99e84841b0998cf1f726709ccd177acfb751d0db9aa70006087a13bf3693bc0b57a0295a48c631d0b80c52472c97ebe88be5c528022b4

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_hashlib.pyd

MD5 7edb6c172c0e44913e166abb50e6fba6
SHA1 3f8c7d0ff8981d49843372572f93a6923f61e8ed
SHA256 258ad0d7e8b2333b4b260530e14ebe6abd12cae0316c4549e276301e5865b531
SHA512 2a59cc13a151d8800a29b4f9657165027e5bf62be1d13c2e12529ef6b7674657435bfd3cc16500b2aa7ce95b405791dd007c01adf4cdd229746bd2218bfdc03f

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_uuid.pyd

MD5 a16b1acfdaadc7bb4f6ddf17659a8d12
SHA1 482982d623d88627c447f96703e4d166f9e51db4
SHA256 8af17a746533844b0f1b8f15f612e1cf0df76ac8f073388e80cfc60759e94de0
SHA512 03d65f37efc6aba325109b5a982be71380210d41dbf8c068d6a994228888d805adac1264851cc6f378e61c3aff1485cc6c059e83218b239397eda0cec87bd533

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_tkinter.pyd

MD5 596eb10e20312a4878db5045c2bbd5f1
SHA1 1f6c1ddeab6f4ce2191eb943987867de959d8251
SHA256 7cb98b0cf72994a4d6d28bc1365edf1f3e1ae104763b767cb3b9f40dac75cde6
SHA512 2faa7a439796790df9eac5e9d9ffa2da70e7a029ab681004017939e59d70c79dd936d63776736fd95e728117b1e8c5d1f373ab687df9c97744106aa667c3f77d

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_ssl.pyd

MD5 8f94142c7b4015e780011c1b883a2b2f
SHA1 c9c3c1277cca1e8fe8db366ca0ecb4a264048f05
SHA256 8b6c028a327e887f1b2ccd35661c4c7c499160e0680ca193b5c818327a72838c
SHA512 7e29163a83601ed1078c03004b3d40542e261fda3b15f22c2feec2531b05254189ae1809c71f9df78a460bf2282635e2287617f2992b6b101854ddd74fcad143

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_sqlite3.pyd

MD5 72a0715cb59c5a84a9d232c95f45bf57
SHA1 3ed02aa8c18f793e7d16cc476348c10ce259feb7
SHA256 d125e113e69a49e46c5534040080bdb35b403eb4ff4e74abf963bce84a6c26ad
SHA512 73c0e768ee0c2e6ac660338d2268540254efe44901e17271595f20f335ada3a9a8af70845e8a253d83a848d800145f7ecb23c92be90e7dd6e5400f72122d09de

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_socket.pyd

MD5 57dc6a74a8f2faaca1ba5d330d7c8b4b
SHA1 905d90741342ac566b02808ad0f69e552bb08930
SHA256 5b73b9ea327f7fb4cefddd65d6050cdec2832e2e634fcbf4e98e0f28d75ad7ca
SHA512 5e2b882fc51f48c469041028b01f6e2bfaf5a49005ade7e82acb375709e74ad49e13d04fd7acb6c0dbe05f06e9966a94753874132baf87858e1a71dcffc1dc07

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_queue.pyd

MD5 f1e7c157b687c7e041deadd112d61316
SHA1 2a7445173518a342d2e39b19825cf3e3c839a5fe
SHA256 d92eadb90aed96acb5fac03bc79553f4549035ea2e9d03713d420c236cd37339
SHA512 982fd974e5892af9f360dc4c7ccaa59928e395ccef8ea675fadb4cf5f16b29350bf44c91ea1fd58d90cbca02522eba9543162e19c38817edbfd118bc254515da

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_overlapped.pyd

MD5 1a1f23c2f77c0bfe9aef5f6caa8ec361
SHA1 f619800dcbadc0b7ad260d01c4c5ccc637dd6454
SHA256 56575851ced641beae3069d316cfaac3590515db15ef99c58b9cb9d1f89a4405
SHA512 f1b283740dfb4b507569ba79c86e75481f3812f91c0aeb4dd1266228db8832e7548dec51aee2e3da5a7b1c0006feb61b0f3eacc01f9ba5ccdc126312bf3b4911

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_multiprocessing.pyd

MD5 087e2b9e1438c9e4a1d750a48d9ff310
SHA1 c1c7c3815581987b133399c0e8c63b6428ee7461
SHA256 ee7f302a26d875850354be0b47ce08a7bf088806c42a92f401c63c1f7f29609b
SHA512 1abb7350c6210f854e7da77519fca0a008951fe12ea5ea5cddb492b9bbda7ad5fb89df8ed0251e2c8a02e1d0918a8386a42a8a152fb93947e3988a75e0dd6f27

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_hashlib.pyd

MD5 7edb6c172c0e44913e166abb50e6fba6
SHA1 3f8c7d0ff8981d49843372572f93a6923f61e8ed
SHA256 258ad0d7e8b2333b4b260530e14ebe6abd12cae0316c4549e276301e5865b531
SHA512 2a59cc13a151d8800a29b4f9657165027e5bf62be1d13c2e12529ef6b7674657435bfd3cc16500b2aa7ce95b405791dd007c01adf4cdd229746bd2218bfdc03f

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_elementtree.pyd

MD5 24bcf5a0f1519af5e9a24d1582a64ae7
SHA1 0d18d48aabd9a938bf9769a275c8829bca5d0008
SHA256 a6faaabb67d9b8cb6fcf32fdd01cb0e0a7b09bf7f2c6cb847a37830aeebc82e4
SHA512 235bebf8ef486300de51e8a008c285b5bcacf653a2d04e8efa94eac7fc893536e6973286a50529a2291be40d095d161d7371c0d3a385e8dc7e3df97505467f09

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_decimal.pyd

MD5 0cfe09615338c6450ac48dd386f545fd
SHA1 61f5bd7d90ec51e4033956e9ae1cfde9dc2544fe
SHA256 a0fa3ad93f98f523d189a8de951e42f70cc1446793098151fc50ba6b5565f2e3
SHA512 42b293e58638074ce950775f5ef10ec1a0bb5980d0df74ad89907a17f7016d68e56c6ded1338e9d04d19651f48448deee33a0657d3c03adba89406d6e5f10c18

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_cffi_backend.cp311-win_amd64.pyd

MD5 1518035a65a45c274f1557ff5655e2d7
SHA1 2676d452113c68aa316cba9a03565ec146088c3f
SHA256 9ca400d84a52ae61c5613403ba379d69c271e8e9e9c3f253f93434c9336bc6e8
SHA512 b5932a2eadd2981a3bbc0918643a9936c9aaafc606d833d5ef2758061e05a3148826060ed52a2d121fabfd719ad9736b3402683640a4c4846b6aaaa457366b66

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_asyncio.pyd

MD5 9fb556f8883df1e8c2dd78a5b6c5c522
SHA1 f3b93bd0cb6d469615f2937b72bdb21c55856f94
SHA256 25fef47ca53ef497b20d1a33f59433ba8b6afaee504c54e08cf6f903245d5f0f
SHA512 67436ab9c7ba569c3946f6a141204c5519d03b0933f231c5736019a1715dd018efe8a39c7c0f642484bbaa60ba235dab54423c8b6fc8ab84ffb4a957508518a3

C:\Users\Admin\AppData\Local\Temp\_MEI11802\zlib1.dll

MD5 a35d7eeae683a35acb99e72e01cf132f
SHA1 cc37f1e0641f6afc821ef45a65986422eb853366
SHA256 c84547746f4c328daa9637414bbb252ec7124005d0cb7d4a8c62779cf641271c
SHA512 dd7996756a3aed62251f90cd0ae95feafa7bc1cfe7c51e7e2e09bfd30bf0bbb2775fe397a1963f63aed7ad49957b4dd75faed022c6ec4ed9576822f650612f2c

C:\Users\Admin\AppData\Local\Temp\_MEI11802\VCRUNTIME140_1.dll

MD5 bba9680bc310d8d25e97b12463196c92
SHA1 9a480c0cf9d377a4caedd4ea60e90fa79001f03a
SHA256 e0b66601cc28ecb171c3d4b7ac690c667f47da6b6183bff80604c84c00d265ab
SHA512 1575c786ac3324b17057255488da5f0bc13ad943ac9383656baf98db64d4ec6e453230de4cd26b535ce7e8b7d41a9f2d3f569a0eff5a84aeb1c2f9d6e3429739

C:\Users\Admin\AppData\Local\Temp\_MEI11802\unicodedata.pyd

MD5 908e8c719267692de04434ab9527f16e
SHA1 5657def35fbd3e5e088853f805eddd6b7b2b3ce9
SHA256 4337d02a4b24467a48b37f1ccbcebd1476ff10bdb6511fbb80030bbe45a25239
SHA512 4f9912803f1fa9f8a376f56e40a6608a0b398915b346d50b6539737f9b75d8e9a905beb5aace5fe69ba8847d815c600eb20330e79a2492168735b5cfdceff39a

C:\Users\Admin\AppData\Local\Temp\_MEI11802\tk86t.dll

MD5 a3b28c19b23fddf32c8920a4d492be47
SHA1 2b9aedaf02d2ec7dbb36596b8ceeb10657480e43
SHA256 c611b2a311da589f93e83f0662dcb8b3bb3db8450c64084da4b067b36a52ecb2
SHA512 24d44d6ddde9d05eaabfa58aadeef85443be46c535d3f290b50f2208fd79f27215f65b099389a04381b6b44a812b17687886185b49eb94f7fd193114cf3c9436

C:\Users\Admin\AppData\Local\Temp\_MEI11802\tcl86t.dll

MD5 ad6e74d50f92edcdb4420750d190610c
SHA1 af6b5fae4d3d5a064df0e727bfd63e8ff82828bc
SHA256 6074ed09ce5ff856dd8f3b27a3207cf31d8f48fa1247853773609357b511068d
SHA512 18630348aa556a672bb1675f2cae3182929c3c4a6c3c5745dfda9865b17d19f895d5f1da98ec6b03ffe921abd34b16a90a56bfede64c351f307491a7f3df6e3e

C:\Users\Admin\AppData\Local\Temp\_MEI11802\sqlite3.dll

MD5 abe8eec6b8876ddad5a7d60640664f40
SHA1 0b3b948a1a29548a73aaf8d8148ab97616210473
SHA256 26fc80633494181388cf382f417389c59c28e9ffedde8c391d95eddb6840b20d
SHA512 de978d97c04bad9ebb3f423210cbcb1b78a07c21daadc5c166e00206ece8dcd7baac1d67c84923c9cc79c8b9dfbec719ce7b5f17343a069527bba1a4d0454c29

C:\Users\Admin\AppData\Local\Temp\_MEI11802\select.pyd

MD5 938c814cc992fe0ba83c6f0c78d93d3f
SHA1 e7c97e733826e53ff5f1317b947bb3ef76adb520
SHA256 9c9b62c84c2373ba509c42adbca01ad184cd525a81ccbcc92991e0f84735696e
SHA512 2f175f575e49de4b8b820171565aedb7474d52ae9914e0a541d994ff9fea38971dd5a34ee30cc570920b8618393fc40ab08699af731005542e02a6a0095691f0

C:\Users\Admin\AppData\Local\Temp\_MEI11802\SDL2_ttf.dll

MD5 9f5ece4e13e42058fa5ea65215c41c5d
SHA1 eddcecb4f10f2bb9b61c57b88fb6bd1b1d560a07
SHA256 f5f2690285fc087376ff03edb8849ab5f24c6e9d60ae3661013bea621786582b
SHA512 09cf0927b7cdb84f9ddec465ba10874af6160f947e58e9ff9ead2aa6d10e7d164dd8c5e2df6314f0dd8a84d0b104b48dbac8cc96522f749d54041b3e8ec03400

C:\Users\Admin\AppData\Local\Temp\_MEI11802\SDL2_mixer.dll

MD5 1230b474eca2c4cefb13cf0aaa2fc5d0
SHA1 e23f9cf8cb7dd47e92a02f7508922f01d4d1364b
SHA256 6879a16d963159cb0666e654ea4d5e9a92abffd96cfc6fffe6b39ae81b4ffca3
SHA512 2520fdfbd1370bb9683c29fe1722f771e3d4c7df635987371190be5445237f9e96ae506bbeb79035f6f483ac116995b56bb1e9fc35b6f6a6d49bb940dbf72ead

C:\Users\Admin\AppData\Local\Temp\_MEI11802\SDL2_image.dll

MD5 7174d7a8eec42d7700c5f4adfff39b57
SHA1 b850f0814e77a67f0414a85aae88c9534ca857e5
SHA256 155eab85fe565f6dd1ecb29d6496425539c994bc0d14b52cabd850df5927f9bf
SHA512 9a79cc9661cdab7efeb096f1eb121807ba937b444546d46a321613f6d2792ebf09cc62ff067ece7cb0458b988d6081feadd33e93a52c24faac53dc1539bf32c9

C:\Users\Admin\AppData\Local\Temp\_MEI11802\SDL2.dll

MD5 9684069bb2b8892408ccb50d66abbeda
SHA1 7df5e8f28481c4e7aef128e017a53a36b86c3b7b
SHA256 123c8a0d647e5b866545f8e1cc4cfba5fdadf8c1a247692050355a609d81996b
SHA512 fbe493326da9b582c9c4fa1b16ba02e5befcf5787324116656e108527894f692c3fc21493419a419833ab37a5fa5fb5e38e2c04a8cbdbc3c8afeba08df390697

C:\Users\Admin\AppData\Local\Temp\_MEI11802\pyexpat.pyd

MD5 9038f4b566dc1c8b95724b6dd9cca9c8
SHA1 4c720b0e97c7831c2488e69f0535f568a8f51ef9
SHA256 ad20c9c97f8626b82317e07ebb313f6bb1ac8f88b7e22623245659305a817763
SHA512 e559545750c6c33e5ffe95c23cb91139f17e759aaf2da151413aacd8057882861ea7eb8444b09ebd2d329e3794595d3bfacbdf8fa43f84822c06d9e26df1bd44

C:\Users\Admin\AppData\Local\Temp\_MEI11802\portmidi.dll

MD5 1b443fe9c75d57eedcf5fd67493573e2
SHA1 27504e51f5f19d3d73ed2a0ba473dc5cda787679
SHA256 96b2ba3d433b0e0a0ce72c72725e033ca35b570225b55b38fb7d71c716418ee3
SHA512 02f0ee765490d999ac621f54411b039ef42dddeba17d2edbb9970db20e481d29aed4d607d8330a7c5cd7133b214f13dcb427e89903f9baaef20ffc4a431bb0c4

C:\Users\Admin\AppData\Local\Temp\_MEI11802\libwebp-7.dll

MD5 4276d3cb447a08644a2c1d3b7afb9fdf
SHA1 d63f34d0b4e8eb660a92a3843b695eda16294b80
SHA256 cc3831ce9ff18f5ebfde8b20d1ee237e2336e4d9ca6405392ac5ec9c8c948174
SHA512 d3a539176243e31a15877b0a6c40c295036ccac5c3ac13cd7b74a340c4183a661a630bbe6b5b0c0ff54b4b27fc72bc154883c7ba5167cb4baeb4b0a528f514bc

C:\Users\Admin\AppData\Local\Temp\_MEI11802\libtiff-5.dll

MD5 f374796886d56c6c552f3a92a81c3338
SHA1 d61f0297386e9925a6ac0c6469ba40b86d3c98cd
SHA256 e2c5b370bcade6a167dba5dc9bb33107d4ed2612e7e8af8d1035be72f35f90d7
SHA512 b59cd888b41c67bf139c2c78d7968a33c84e9127752b9fa276b7b3b461a01cd71dc72936e51a334ddad7fa8e67dd4c250a3495ce544aa156efacb77e7f1dce9f

C:\Users\Admin\AppData\Local\Temp\_MEI11802\libssl-1_1.dll

MD5 7bcb0f97635b91097398fd1b7410b3bc
SHA1 7d4fc6b820c465d46f934a5610bc215263ee6d3e
SHA256 abe8267f399a803224a1f3c737bca14dee2166ba43c1221950e2fbce1314479e
SHA512 835bab65d00884912307694c36066528e7b21f3b6e7a1b9c90d4da385334388af24540b9d7a9171e89a4802612a8b6523c77f4752c052bf47adbd6839bc4b92c

C:\Users\Admin\AppData\Local\Temp\_MEI11802\libpng16-16.dll

MD5 8f3bf615136b7241204419fb24c8d5ad
SHA1 d107f0b405c566974c37be20e1abbd365ccbb750
SHA256 a9c4d2443d6de90091eff8a5adfd7a3c207b0c7aefb913b855320866e93f8039
SHA512 a2ced7974c086291e69dce39f841335c771088aecbbc52b049d7af51c81342bd1e8bd0d8c78e62529e2041d15d8f5317e5a41727e299c2d827027bcbb0382aa1

C:\Users\Admin\AppData\Local\Temp\_MEI11802\libopusfile-0.dll

MD5 a729c1b14d695b00ae79472d3fe45339
SHA1 20cd334187fc7297138f014303e5c82b5f918c80
SHA256 57bb8b7dec2bd35ff1031f12c4ba3aa3cb2e8de2445e21ea29ffa3ad13e7be3a
SHA512 1da8060b1767bdf811b005e4a476c18f1c2f93186334aa40ca59937cec7aed37267c45a3b5aaeb8fa13d9b0639959d128d957e6d08fcb9787926df850e42fc22

C:\Users\Admin\AppData\Local\Temp\_MEI11802\libopus-0.x64.dll

MD5 17bed62f3389d532d3dfc59071bbd214
SHA1 2b0894cc48dd3756f0ff6602bf8c1e24cb8b6642
SHA256 4fd26640721088ac31fdac941db6fa3c094ca17bd97d240992969aefae19ff91
SHA512 976c5e0dd50487eb5f88c195633805cccbf34566496065eaf8f3ecbbea0300653097bfbbf628dbb2c238a4d552460187794bcebcb8d41452a3f873f0244fc6a4

C:\Users\Admin\AppData\Local\Temp\_MEI11802\libopus-0.dll

MD5 3c2e93c3d2b292a0f489449209f8e099
SHA1 751f18a79c6da4e7162439cef4d481189d17a242
SHA256 b6b32593c0bcecea7b31a900086870bbab039f25b29067170ac461cf2479dea5
SHA512 a0ec68d2a1c650720b4e3e437a5841e8d04d165fc920ce26a41cc20d6ddf4c761b05bbf3426e241c2ee13a9fbe146fc889aa45df70397600b2d962bdaa1bedbb

C:\Users\Admin\AppData\Local\Temp\_MEI11802\libogg-0.dll

MD5 6ffebd7d283079e9029c7f29d8ca7fba
SHA1 b470b09c8aa2f3e42bcff8392d95b6259cb87555
SHA256 0d9a915ea29ed4da271f86dbcfa90b52064a26b5136af590b2bb430d5dd6a67e
SHA512 2b9a9b5f298eefccf0a08af52d7c2c803db19ab9f3cedad2bb19df50466527c05e31f956b6018c9a337565448249465eba8952e9e8397b728b7f76e4f0561c68

C:\Users\Admin\AppData\Local\Temp\_MEI11802\libmodplug-1.dll

MD5 072093b2671589d4ce465de2b92ebee4
SHA1 821d9827286271859640984df28e01b4a37341fb
SHA256 04d07b4dcae8d3998156d563df20881ba790c32389aca23ade91de9cf9f4a3d4
SHA512 522d5faa8d17017f1891374a23d6e653cd62b51818734bf1f7343248d09e1e314ae49821595818fe69af62c9e51debca4ae384e421ad8fa658aced95f977379e

C:\Users\Admin\AppData\Local\Temp\_MEI11802\libcrypto-1_1.dll

MD5 e5aecaf59c67d6dd7c7979dfb49ed3b0
SHA1 b0a292065e1b3875f015277b90d183b875451450
SHA256 9d2257d0de8172bcc8f2dba431eb91bd5b8ac5a9cbe998f1dcac0fac818800b1
SHA512 145eaa969a1a14686ab99e84841b0998cf1f726709ccd177acfb751d0db9aa70006087a13bf3693bc0b57a0295a48c631d0b80c52472c97ebe88be5c528022b4

C:\Users\Admin\AppData\Local\Temp\_MEI11802\freetype.dll

MD5 522257e451efcc3bfe980f56d3fed113
SHA1 f5e12321517f523842943ea7f3ba74d449dba1f4
SHA256 8c74376e7932eebcd084191b40774056b32525ba48e375d942754cdc4fc03c60
SHA512 d590cd813281278be4aec86af3713216dd306399b4910221a2447a3200accbca1b5f8d9495bf21f69ff8e09e5465a71c715a85ce0d87cdc26cbf27b0fae2cc4c

C:\Users\Admin\AppData\Local\Temp\_MEI11802\crypto_clipper.json

MD5 fbf6b481013c092cfe9e08a9c74495ce
SHA1 7c6ccbbb6211ed676105257271f654c0d1c61b4f
SHA256 2d34116fd8d4155eb7cb986b6296b82bd6a538e070aae9ebc43af72c0b7fc1ad
SHA512 6075569c9265e35c93c9d4d8de1a3b91bc7233cd38ff76ae16fba32a1dcc600a11227738bef0710168c17827734352c2c2c4cf83cf2019b14753554c6a62a530

memory/1384-1264-0x00007FF8E51A0000-0x00007FF8E51C3000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_lzma.pyd

MD5 71f0b9f90aa4bb5e605df0ea58673578
SHA1 c7c01a11b47dc6a447c7475ef6ba7dec7c7ba24e
SHA256 d0e10445281cf3195c2a1aa4e0e937d69cae07c492b74c9c796498db33e9f535
SHA512 fc63b8b48d6786caecaf1aa3936e5f2d8fcf44a5a735f56c4200bc639d0cb9c367151a7626aa5384f6fc126a2bd0f068f43fd79277d7ec9adfc4dcb4b8398ae2

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_lzma.pyd

MD5 71f0b9f90aa4bb5e605df0ea58673578
SHA1 c7c01a11b47dc6a447c7475ef6ba7dec7c7ba24e
SHA256 d0e10445281cf3195c2a1aa4e0e937d69cae07c492b74c9c796498db33e9f535
SHA512 fc63b8b48d6786caecaf1aa3936e5f2d8fcf44a5a735f56c4200bc639d0cb9c367151a7626aa5384f6fc126a2bd0f068f43fd79277d7ec9adfc4dcb4b8398ae2

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_bz2.pyd

MD5 83b5d1943ac896a785da5343614b16bc
SHA1 9d94b7f374030fed7f6e876434907561a496f5d9
SHA256 bf79ddbfa1cc4df7987224ee604c71d9e8e7775b9109bf4ff666af189d89398a
SHA512 5e7dcc80ac85bd6dfc4075863731ea8da82edbb3f8ffafba7b235660a1bd0c60f7dfde2f7e835379388de277f9c1ceae7f209495f868cb2bd7db0de16495633c

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_bz2.pyd

MD5 83b5d1943ac896a785da5343614b16bc
SHA1 9d94b7f374030fed7f6e876434907561a496f5d9
SHA256 bf79ddbfa1cc4df7987224ee604c71d9e8e7775b9109bf4ff666af189d89398a
SHA512 5e7dcc80ac85bd6dfc4075863731ea8da82edbb3f8ffafba7b235660a1bd0c60f7dfde2f7e835379388de277f9c1ceae7f209495f868cb2bd7db0de16495633c

C:\Users\Admin\AppData\Local\Temp\_MEI11802\libffi-8.dll

MD5 87786718f8c46d4b870f46bcb9df7499
SHA1 a63098aabe72a3ed58def0b59f5671f2fd58650b
SHA256 1928574a8263d2c8c17df70291f26477a1e5e8b3b9ab4c4ff301f3bc5ce5ca33
SHA512 3abf0a3448709da6b196fe9238615d9d0800051786c9691f7949abb3e41dfb5bdaf4380a620e72e1df9e780f9f34e31caad756d2a69cad894e9692aa161be9f7

C:\Users\Admin\AppData\Local\Temp\_MEI11802\libffi-8.dll

MD5 87786718f8c46d4b870f46bcb9df7499
SHA1 a63098aabe72a3ed58def0b59f5671f2fd58650b
SHA256 1928574a8263d2c8c17df70291f26477a1e5e8b3b9ab4c4ff301f3bc5ce5ca33
SHA512 3abf0a3448709da6b196fe9238615d9d0800051786c9691f7949abb3e41dfb5bdaf4380a620e72e1df9e780f9f34e31caad756d2a69cad894e9692aa161be9f7

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_ctypes.pyd

MD5 7ecc651b0bcf9b93747a710d67f6c457
SHA1 ebb6dcd3998af9fff869184017f2106d7a9c18f3
SHA256 b43963b0883ba2e99f2b7dd2110d33063071656c35e6575fca203595c1c32b1a
SHA512 1ff4837e100bc76f08f4f2e9a7314bcaf23ebfa4f9a82dc97615cde1f3d29416004c6346e51afc6e61360573df5fcd2a3b692fd544ccad5c616fb63ac49303c5

C:\Users\Admin\AppData\Local\Temp\_MEI11802\python3.dll

MD5 2ad3039bd03669f99e948f449d9f778b
SHA1 dae8f661990c57adb171667b9206c8d84c50ecad
SHA256 852b901e17022c437f8fc3039a5af2ee80c5d509c9ef5f512041af17c48fcd61
SHA512 8ffeaa6cd491d7068f9176fd628002c84256802bd47a17742909f561ca1da6a2e7c600e17cd983063e8a93c2bbe9b981bd43e55443d28e32dfb504d7f1e120c0

C:\Users\Admin\AppData\Local\Temp\_MEI11802\python3.DLL

MD5 2ad3039bd03669f99e948f449d9f778b
SHA1 dae8f661990c57adb171667b9206c8d84c50ecad
SHA256 852b901e17022c437f8fc3039a5af2ee80c5d509c9ef5f512041af17c48fcd61
SHA512 8ffeaa6cd491d7068f9176fd628002c84256802bd47a17742909f561ca1da6a2e7c600e17cd983063e8a93c2bbe9b981bd43e55443d28e32dfb504d7f1e120c0

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_ctypes.pyd

MD5 7ecc651b0bcf9b93747a710d67f6c457
SHA1 ebb6dcd3998af9fff869184017f2106d7a9c18f3
SHA256 b43963b0883ba2e99f2b7dd2110d33063071656c35e6575fca203595c1c32b1a
SHA512 1ff4837e100bc76f08f4f2e9a7314bcaf23ebfa4f9a82dc97615cde1f3d29416004c6346e51afc6e61360573df5fcd2a3b692fd544ccad5c616fb63ac49303c5

memory/1384-1312-0x00007FF8E4A90000-0x00007FF8E4AA9000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_socket.pyd

MD5 57dc6a74a8f2faaca1ba5d330d7c8b4b
SHA1 905d90741342ac566b02808ad0f69e552bb08930
SHA256 5b73b9ea327f7fb4cefddd65d6050cdec2832e2e634fcbf4e98e0f28d75ad7ca
SHA512 5e2b882fc51f48c469041028b01f6e2bfaf5a49005ade7e82acb375709e74ad49e13d04fd7acb6c0dbe05f06e9966a94753874132baf87858e1a71dcffc1dc07

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_ssl.pyd

MD5 8f94142c7b4015e780011c1b883a2b2f
SHA1 c9c3c1277cca1e8fe8db366ca0ecb4a264048f05
SHA256 8b6c028a327e887f1b2ccd35661c4c7c499160e0680ca193b5c818327a72838c
SHA512 7e29163a83601ed1078c03004b3d40542e261fda3b15f22c2feec2531b05254189ae1809c71f9df78a460bf2282635e2287617f2992b6b101854ddd74fcad143

memory/1384-1314-0x00007FF8E4E90000-0x00007FF8E4E9D000-memory.dmp

memory/1384-1317-0x00007FF8D4430000-0x00007FF8D44E8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI11802\libssl-1_1.dll

MD5 7bcb0f97635b91097398fd1b7410b3bc
SHA1 7d4fc6b820c465d46f934a5610bc215263ee6d3e
SHA256 abe8267f399a803224a1f3c737bca14dee2166ba43c1221950e2fbce1314479e
SHA512 835bab65d00884912307694c36066528e7b21f3b6e7a1b9c90d4da385334388af24540b9d7a9171e89a4802612a8b6523c77f4752c052bf47adbd6839bc4b92c

memory/1384-1318-0x00007FF8E4990000-0x00007FF8E49BE000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI11802\select.pyd

MD5 938c814cc992fe0ba83c6f0c78d93d3f
SHA1 e7c97e733826e53ff5f1317b947bb3ef76adb520
SHA256 9c9b62c84c2373ba509c42adbca01ad184cd525a81ccbcc92991e0f84735696e
SHA512 2f175f575e49de4b8b820171565aedb7474d52ae9914e0a541d994ff9fea38971dd5a34ee30cc570920b8618393fc40ab08699af731005542e02a6a0095691f0

C:\Users\Admin\AppData\Local\Temp\_MEI11802\_queue.pyd

MD5 f1e7c157b687c7e041deadd112d61316
SHA1 2a7445173518a342d2e39b19825cf3e3c839a5fe
SHA256 d92eadb90aed96acb5fac03bc79553f4549035ea2e9d03713d420c236cd37339
SHA512 982fd974e5892af9f360dc4c7ccaa59928e395ccef8ea675fadb4cf5f16b29350bf44c91ea1fd58d90cbca02522eba9543162e19c38817edbfd118bc254515da

C:\Users\Admin\AppData\Local\Temp\_MEI11802\charset_normalizer\md.cp311-win_amd64.pyd

MD5 5733500569fd188a6d8b5451b20b2410
SHA1 0d67f1dd322557467640638266ffaa6be16c552e
SHA256 b063faae068f5c6635f8742ae57dd26dc5874ddd3fc7724a23e75f9aef36c493
SHA512 42c143ae71248550eeee15725d8b37d3480dcad7ec51b6ed93eccbb75057baa3f766c23861ce277d5711aa75b8079964cc72cd3142e28c4b8658689276ce35e9

memory/1384-1323-0x00007FF8DD840000-0x00007FF8DD863000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI11802\charset_normalizer\md.cp311-win_amd64.pyd

MD5 5733500569fd188a6d8b5451b20b2410
SHA1 0d67f1dd322557467640638266ffaa6be16c552e
SHA256 b063faae068f5c6635f8742ae57dd26dc5874ddd3fc7724a23e75f9aef36c493
SHA512 42c143ae71248550eeee15725d8b37d3480dcad7ec51b6ed93eccbb75057baa3f766c23861ce277d5711aa75b8079964cc72cd3142e28c4b8658689276ce35e9

memory/1384-1324-0x00007FF8E4920000-0x00007FF8E492B000-memory.dmp

memory/1384-1325-0x00007FF8D4310000-0x00007FF8D442C000-memory.dmp

memory/1384-1320-0x00007FF8E4930000-0x00007FF8E493D000-memory.dmp

memory/1384-1326-0x00007FF8DACB0000-0x00007FF8DACE8000-memory.dmp

memory/1384-1327-0x00007FF8D48C0000-0x00007FF8D4EAA000-memory.dmp

memory/1384-1328-0x00007FF8E4910000-0x00007FF8E491B000-memory.dmp

memory/1384-1329-0x00007FF8E4440000-0x00007FF8E444B000-memory.dmp

memory/1384-1330-0x00007FF8E4430000-0x00007FF8E443C000-memory.dmp

memory/1384-1331-0x00007FF8E0A60000-0x00007FF8E0A6C000-memory.dmp

memory/1384-1333-0x00007FF8E0780000-0x00007FF8E078C000-memory.dmp

memory/1384-1332-0x00007FF8E0830000-0x00007FF8E083B000-memory.dmp

memory/1384-1334-0x00007FF8E0720000-0x00007FF8E072D000-memory.dmp

memory/1384-1335-0x00007FF8DF460000-0x00007FF8DF46E000-memory.dmp

memory/1384-1337-0x00007FF8DE5F0000-0x00007FF8DE5FC000-memory.dmp

memory/1384-1336-0x00007FF8DEC20000-0x00007FF8DEC2C000-memory.dmp

memory/1384-1340-0x00007FF8DC2E0000-0x00007FF8DC2EC000-memory.dmp

memory/1384-1339-0x00007FF8DC2F0000-0x00007FF8DC2FB000-memory.dmp

memory/1384-1338-0x00007FF8DD830000-0x00007FF8DD83B000-memory.dmp

memory/1384-1343-0x00007FF8D5CF0000-0x00007FF8D5D02000-memory.dmp

memory/1384-1344-0x00007FF8DB8C0000-0x00007FF8DB8CC000-memory.dmp

memory/1384-1345-0x00007FF8D58C0000-0x00007FF8D58D5000-memory.dmp

memory/1384-1346-0x00007FF8D42F0000-0x00007FF8D4302000-memory.dmp

memory/1384-1347-0x00007FF8D42D0000-0x00007FF8D42E4000-memory.dmp

memory/1384-1341-0x00007FF8DBC30000-0x00007FF8DBC3C000-memory.dmp

memory/1384-1342-0x00007FF8DB8D0000-0x00007FF8DB8DD000-memory.dmp

memory/1384-1348-0x00007FF8E0A70000-0x00007FF8E0A7B000-memory.dmp

memory/1384-1349-0x00007FF8D4540000-0x00007FF8D48B5000-memory.dmp

memory/1384-1350-0x00007FF8D42B0000-0x00007FF8D42CB000-memory.dmp

memory/1384-1351-0x00007FF8D4270000-0x00007FF8D4285000-memory.dmp

memory/1384-1352-0x00007FF8D4230000-0x00007FF8D426F000-memory.dmp

memory/1384-1353-0x00007FF8D4210000-0x00007FF8D422C000-memory.dmp

memory/1384-1354-0x00007FF8D4150000-0x00007FF8D417E000-memory.dmp

memory/1384-1355-0x00007FF8D4110000-0x00007FF8D4133000-memory.dmp

memory/1384-1356-0x00007FF8D3FA0000-0x00007FF8D410F000-memory.dmp

memory/1384-1358-0x00007FF8D3F60000-0x00007FF8D3F6B000-memory.dmp

memory/1384-1359-0x00007FF8D3F50000-0x00007FF8D3F5C000-memory.dmp

memory/1384-1357-0x00007FF8D3F70000-0x00007FF8D3F7B000-memory.dmp

memory/1384-1360-0x00007FF8D3F30000-0x00007FF8D3F3C000-memory.dmp

memory/1384-1361-0x00007FF8D3F20000-0x00007FF8D3F2B000-memory.dmp

memory/1384-1363-0x00007FF8D3F00000-0x00007FF8D3F0D000-memory.dmp

memory/1384-1365-0x00007FF8D3EE0000-0x00007FF8D3EEC000-memory.dmp

memory/1384-1367-0x00007FF8D3EC0000-0x00007FF8D3ECB000-memory.dmp

memory/1384-1366-0x00007FF8D3ED0000-0x00007FF8D3EDC000-memory.dmp

memory/1384-1368-0x00007FF8D3EA0000-0x00007FF8D3EAC000-memory.dmp

memory/1384-1364-0x00007FF8D3EF0000-0x00007FF8D3EFE000-memory.dmp

memory/1384-1369-0x00007FF8D3E90000-0x00007FF8D3E9C000-memory.dmp

memory/1384-1362-0x00007FF8D3F10000-0x00007FF8D3F1C000-memory.dmp

memory/1384-1370-0x00007FF8D3E80000-0x00007FF8D3E8D000-memory.dmp

memory/1384-1371-0x00007FF8D3E60000-0x00007FF8D3E72000-memory.dmp

memory/1384-1372-0x00007FF8D3E50000-0x00007FF8D3E5C000-memory.dmp

memory/1384-1373-0x00007FF8D4290000-0x00007FF8D42A2000-memory.dmp

memory/1384-1376-0x00007FF8E4AE0000-0x00007FF8E4AF4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_53gee3oi.tpj.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/1384-1503-0x00007FF8D48C0000-0x00007FF8D4EAA000-memory.dmp

memory/1384-1504-0x00007FF8E51A0000-0x00007FF8E51C3000-memory.dmp

memory/1384-1508-0x00007FF8E4AE0000-0x00007FF8E4AF4000-memory.dmp

memory/1384-1512-0x00007FF8E4990000-0x00007FF8E49BE000-memory.dmp

memory/1384-1510-0x00007FF8E4A90000-0x00007FF8E4AA9000-memory.dmp

memory/1384-1516-0x00007FF8DD840000-0x00007FF8DD863000-memory.dmp

memory/1384-1518-0x00007FF8DACB0000-0x00007FF8DACE8000-memory.dmp

memory/1384-1519-0x00007FF8D58C0000-0x00007FF8D58D5000-memory.dmp

memory/1384-1522-0x00007FF8D42B0000-0x00007FF8D42CB000-memory.dmp

memory/1384-1523-0x00007FF8D4290000-0x00007FF8D42A2000-memory.dmp

memory/1384-1525-0x00007FF8D4230000-0x00007FF8D426F000-memory.dmp

memory/1384-1527-0x00007FF8D4210000-0x00007FF8D422C000-memory.dmp

memory/1384-1529-0x00007FF8D4180000-0x00007FF8D41A9000-memory.dmp

memory/1384-1530-0x00007FF8D4150000-0x00007FF8D417E000-memory.dmp

memory/1384-1533-0x00007FF8D3F80000-0x00007FF8D3F9C000-memory.dmp

memory/1384-1536-0x00007FF8D3D20000-0x00007FF8D3D4B000-memory.dmp

memory/1384-1535-0x00007FF8D3D50000-0x00007FF8D3E0C000-memory.dmp

memory/1384-1537-0x00007FF8D3AC0000-0x00007FF8D3D14000-memory.dmp

memory/1384-1538-0x00007FF8D3A60000-0x00007FF8D3AB5000-memory.dmp

memory/1384-1539-0x00007FF8D3750000-0x00007FF8D3A2F000-memory.dmp

memory/1384-1542-0x00007FF8D14A0000-0x00007FF8D14C1000-memory.dmp

memory/1384-1543-0x00007FF8D1470000-0x00007FF8D1492000-memory.dmp

memory/1384-1545-0x00007FF8D13A0000-0x00007FF8D13D0000-memory.dmp

memory/1384-1544-0x00007FF8D13D0000-0x00007FF8D146C000-memory.dmp

memory/1384-1541-0x00007FF8D14D0000-0x00007FF8D14E7000-memory.dmp

memory/1384-1548-0x00007FF8D1190000-0x00007FF8D11AA000-memory.dmp

memory/1384-1549-0x00007FF8D12F0000-0x00007FF8D1309000-memory.dmp

memory/1384-1550-0x00007FF8D12D0000-0x00007FF8D12ED000-memory.dmp

memory/1384-1551-0x00007FF8D12B0000-0x00007FF8D12C3000-memory.dmp

memory/1384-1552-0x00007FF8D11F0000-0x00007FF8D12A4000-memory.dmp

memory/1384-1554-0x00007FF8D0D80000-0x00007FF8D118F000-memory.dmp

memory/1384-1555-0x00007FF8D0CE0000-0x00007FF8D0D73000-memory.dmp

memory/1384-1556-0x00007FF8D0C90000-0x00007FF8D0CDB000-memory.dmp

memory/1384-1557-0x00007FF8C5670000-0x00007FF8C7563000-memory.dmp

memory/1384-1558-0x00007FF8D0AD0000-0x00007FF8D0B79000-memory.dmp

memory/1384-1559-0x00007FF8D08A0000-0x00007FF8D0AC6000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

MD5 99914b932bd37a50b983c5e7c90ae93b
SHA1 bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA256 44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA512 27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 272d5fe0ad0b79ed7b7c63ac071390df
SHA1 f828611adae3202d37a60ba38b6f1d0b2bd8fbe0
SHA256 bc9ebdf28774c1ef2b6ae77f4cd543bf0ca6563d695a0e921ae1b4bafb08e289
SHA512 4da25c720dbcb406c96ad0e6267937e41b81e21baf1265a04daa92616544e3af0089fc866ae6e1493aa5b68c20b5d227937d01addd0b07b62035a5c65559fe1e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 81f6d8c510dba7bc6426165074e74b3a
SHA1 e6eaadecb771ccd0db4d7c427bdb5413457c9abd
SHA256 54979de787ebdf7aa3c2c2b34382d9a22940477536df62ce83765d64e054faae
SHA512 d885767d305ca374b255803d749483f9c775625c99d1660fa7cd05145c4d8593b328871c8a1556db62ca85c08b0e1282edb905bb31cdd4ab59f616e959de79cb

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 4640d687644fc51563da95d95c466348
SHA1 e83bac04ad97751fa33559cd66fdb386ce38c3b2
SHA256 810337e3bd15790906f264143978063675be7bce98ec2005e6b3146f2fe15017
SHA512 963e286d05f319bbbcd8194653cf377b53d9eb73519801d3336ba4710b14b6c268b92892456ecc6a9ec27baea037759449381b113d680460c7e1b99567ef6896

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 ef880de00562f3ed82c9f49a1891d4d3
SHA1 879c60c4e2b08e54825b7f99f16605e17c501a96
SHA256 b3b558bca2c75ef3b8d94c1be79bf49ff1e916ccaae916f009a886946f0b41cd
SHA512 4d821e2505a296ac837d76221390fb9ae240db2657147c800138f9de3cd78c70dd738917192c043a4389a502b8f4ac28f29162fe75785deef264326c77749c1d

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 cc9b2badb32eafe22bbfaaa89e7c422c
SHA1 2df66377a74f39823d4c2ae44722314a5d727b2b
SHA256 60d542bcb80d841a648a8b9b9a50b4c3595be1d4e44862e43ce564f7ea801de5
SHA512 e60a04fd086b41ad8c626cbbbd340a2145cd883700dd110a2c50b7aefdfdc2d8ffcfb78c59e52ce86ec2e66b5028df27a4b6d57fa8426e4d7997691eed654561

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\ShaderCache\data_1

MD5 f50f89a0a91564d0b8a211f8921aa7de
SHA1 112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256 b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512 bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58