Malware Analysis Report

2024-11-15 07:47

Sample ID 240619-qz7j3swcrk
Target DBDRegion.exe
SHA256 cd48d669f80287ca39d869f9a750ba74cba5685cf959cf9528b90dfcccd5607b
Tags
pyinstaller
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

SHA256

cd48d669f80287ca39d869f9a750ba74cba5685cf959cf9528b90dfcccd5607b

Threat Level: Likely malicious

The file DBDRegion.exe was found to be: Likely malicious.

Malicious Activity Summary

pyinstaller

Drops file in Drivers directory

Loads dropped DLL

Legitimate hosting services abused for malware hosting/C2

Enumerates physical storage devices

Unsigned PE

Detects Pyinstaller

Suspicious use of SendNotifyMessage

Enumerates system info in registry

Suspicious behavior: AddClipboardFormatListener

Suspicious behavior: EnumeratesProcesses

Suspicious use of FindShellTrayWindow

Suspicious use of WriteProcessMemory

Suspicious behavior: GetForegroundWindowSpam

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-19 13:43

Signatures

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-19 13:42

Reported

2024-06-19 13:45

Platform

win11-20240611-en

Max time kernel

150s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe"

Signatures

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\System32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A raw.githubusercontent.com N/A N/A
N/A raw.githubusercontent.com N/A N/A

Enumerates physical storage devices

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4808 wrote to memory of 5012 N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe
PID 4808 wrote to memory of 5012 N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe
PID 5012 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe C:\Windows\system32\cmd.exe
PID 5012 wrote to memory of 2792 N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe C:\Windows\system32\cmd.exe
PID 5012 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 5012 wrote to memory of 4552 N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 4420 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 4420 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 3392 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 2908 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 2908 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 1608 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 1608 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 1608 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 1608 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 1608 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 1608 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 1608 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 1608 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 1608 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 1608 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 1608 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 1608 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 1608 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 4552 wrote to memory of 1608 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe

"C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe"

C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe

"C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Kinuseka/DBD-Region-Changer

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9471e3cb8,0x7ff9471e3cc8,0x7ff9471e3cd8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1888,8484843796040141674,14057440831645768012,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1908 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1888,8484843796040141674,14057440831645768012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2084 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1888,8484843796040141674,14057440831645768012,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,8484843796040141674,14057440831645768012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,8484843796040141674,14057440831645768012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1888,8484843796040141674,14057440831645768012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5564 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1888,8484843796040141674,14057440831645768012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4932 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,8484843796040141674,14057440831645768012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3916 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,8484843796040141674,14057440831645768012,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,8484843796040141674,14057440831645768012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,8484843796040141674,14057440831645768012,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://github.com/Kinuseka/DBD-Region-Changer/releases/latest

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9471e3cb8,0x7ff9471e3cc8,0x7ff9471e3cd8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1888,8484843796040141674,14057440831645768012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:1

Network

Country Destination Domain Proto
US 8.8.8.8:53 docs.aws.amazon.com udp
FR 52.222.201.129:443 docs.aws.amazon.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 8.8.8.8:53 129.201.222.52.in-addr.arpa udp
US 8.8.8.8:53 249.248.16.104.in-addr.arpa udp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
N/A 52.95.21.15:0 icmp
N/A 52.46.131.105:0 icmp
N/A 176.32.112.144:0 icmp
N/A 52.119.164.177:0 icmp
N/A 52.95.80.229:0 icmp
N/A 52.95.195.92:0 icmp
N/A 15.221.12.38:0 icmp
N/A 103.8.175.229:0 icmp
N/A 52.119.222.195:0 icmp
N/A 52.94.100.205:0 icmp
N/A 52.94.204.248:0 icmp
N/A 52.95.120.71:0 icmp
N/A 52.94.56.186:0 icmp
N/A 52.94.206.99:0 icmp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
N/A 52.95.19.27:0 icmp
N/A 72.21.207.127:0 icmp
N/A 52.119.161.68:0 icmp
N/A 52.119.184.60:0 icmp
N/A 103.8.174.182:0 icmp
N/A 52.119.218.82:0 icmp
N/A 52.94.96.235:0 icmp
N/A 52.94.205.108:0 icmp
N/A 52.95.116.140:0 icmp
N/A 52.94.53.31:0 icmp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
N/A 176.32.114.164:0 icmp
N/A 52.119.168.113:0 icmp
N/A 52.95.84.209:0 icmp
N/A 52.95.195.86:0 icmp
N/A 52.119.220.81:0 icmp
N/A 54.239.33.94:0 icmp
N/A 52.94.49.48:0 icmp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
N/A 52.46.135.130:0 icmp
N/A 52.46.173.29:0 icmp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
N/A 52.95.196.175:0 icmp
N/A 54.240.206.217:0 icmp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
US 104.16.248.249:443 cloudflare-dns.com tcp
N/A 52.95.17.65:0 icmp
N/A 52.95.88.202:0 icmp
N/A 52.119.185.84:0 icmp
GB 20.26.156.215:443 github.com tcp
GB 20.26.156.215:443 github.com tcp
US 185.199.109.154:443 github.githubassets.com tcp
US 185.199.110.133:443 raw.githubusercontent.com tcp
US 185.199.109.154:443 github.githubassets.com tcp
US 185.199.109.154:443 github.githubassets.com tcp
US 185.199.109.154:443 github.githubassets.com tcp
US 185.199.109.154:443 github.githubassets.com tcp
US 185.199.109.154:443 github.githubassets.com tcp
US 8.8.8.8:53 133.110.199.185.in-addr.arpa udp
US 185.199.108.133:443 raw.githubusercontent.com tcp
N/A 52.94.207.116:0 icmp
US 185.199.109.154:443 github.githubassets.com tcp
US 140.82.112.22:443 collector.github.com tcp
US 140.82.112.22:443 collector.github.com tcp
US 185.199.109.154:443 github.githubassets.com tcp
GB 20.26.156.210:443 api.github.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
N/A 224.0.0.251:5353 udp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
N/A 52.119.188.10:0 icmp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp
US 104.16.249.249:443 cloudflare-dns.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI48082\ucrtbase.dll

MD5 0e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA1 4189f4459c54e69c6d3155a82524bda7549a75a6
SHA256 8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512 a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

C:\Users\Admin\AppData\Local\Temp\_MEI48082\python310.dll

MD5 efe2d90cc0e7b8741109513e28bcd62a
SHA1 0f3076290f70a3b6646376a48a95709b1967f8d7
SHA256 b174d52c48323281b4c71881b77e67c7b38a430b9ee3e1c33ed8468eb80cce37
SHA512 6051a1b244f6980030cec4408480f8f910770ae0f1122fe1f8a373add76fce63acaae987889c65587939a769ba07aa62c9aadbb396cab6b648fa4d25e179fcb7

C:\Users\Admin\AppData\Local\Temp\_MEI48082\zlib.dll

MD5 d00d9d7b9e0215553c30bb974009356b
SHA1 4608882531ad0c106732682cbe746d911c38fc9a
SHA256 54c755e6b90499a5ef49a65ce9472535286fe4db3565a06c4a53f8a4833532dc
SHA512 8795959cdd8525b449193b90cebe81e8ae7876858a6cc706a255c6d2af5696be92e1dc93ef34551b4888b51c1f5dce920d834ef6ff8f8f4693cd4433e488dc56

C:\Users\Admin\AppData\Local\Temp\_MEI48082\VCRUNTIME140.dll

MD5 8697c106593e93c11adc34faa483c4a0
SHA1 cd080c51a97aa288ce6394d6c029c06ccb783790
SHA256 ff43e813785ee948a937b642b03050bb4b1c6a5e23049646b891a66f65d4c833
SHA512 724bbed7ce6f7506e5d0b43399fb3861dda6457a2ad2fafe734f8921c9a4393b480cdd8a435dbdbd188b90236cb98583d5d005e24fa80b5a0622a6322e6f3987

C:\Users\Admin\AppData\Local\Temp\_MEI48082\base_library.zip

MD5 6dbdd4d0d703a952f340bc7ec651e946
SHA1 78454cb350e9128d8571aa09028f6dafe353babd
SHA256 116ddbb8c337b18480478e3cf75cf457e3dae1eb35c4986559d1075af29ddb89
SHA512 d63c3bea11bc80bceb3bb800d964205f8211e203e84fd2c36d1565a770002fe11971bf44efc85bf620fd8431690538f310990f9a79ac5c2b66019378b153e04b

C:\Users\Admin\AppData\Local\Temp\_MEI48082\_ctypes.pyd

MD5 7b0d084a34e97a0c965c638f154ceb50
SHA1 efe50cfee0a977131bb320ad36ec67572ab32a3e
SHA256 b03acf0932a63396b9c24d4e8a89cfb45fa4073dac2242b0082fd55d1a116e80
SHA512 bb4343db58f6bc41dbde3d54f88060279c3ecee295d2f4b858b97ca39206a7a9960ba25462608c434ba865cd0c0b805eeb54f357ed740611fde1954c3359acc3

C:\Users\Admin\AppData\Local\Temp\_MEI48082\python3.DLL

MD5 a9c5b205eb2dd5bb82e1bc46b71e3a21
SHA1 7f37785f277368d75df916b2a6b40b83443f4ee8
SHA256 88d1eef72d4cf1e43701f86ae17a93dbca4abaa6e7c57ed0c6f328538e31d710
SHA512 69e126e1684e36eb1c2ffd5c6b91ab2eed8908ad98d716bcafac3a0f5594a58619a832673ad07f1bd0ad010c32e9d7e5946819b4cc52529318258f9edd75fa5e

C:\Users\Admin\AppData\Local\Temp\_MEI48082\ffi.dll

MD5 0f18bcbeb2da9ceb5eb5c6f3f9113fe9
SHA1 0a0dba0a23a48f117480d63fee0fa61e39ae39ca
SHA256 4ec927d13273dd1a5ffd6b42151e9ff097ca8b07a169b697496c98ce457ca913
SHA512 1cd99d0effb44f5dacc2eb5107162886e31acc5f5cff7484f2c949d95562d54cc200189990d33ebb15c5c012f5514e473cabcab66373c76e6db6e7d76623ff05

C:\Users\Admin\AppData\Local\Temp\_MEI48082\_lzma.pyd

MD5 7261093f9b03b18ca9c932ae27ebf376
SHA1 3d87cf179adf9291fa5dae6a8a525f47fd26ff9c
SHA256 436113d6aa749f9e3332248b6aaf35bd7b9f20c0acb2fe8bc3063ce43c5f68c2
SHA512 ff0f67b7114cdb251207099053610a9e12cfc4fc7482474bba7ad1912fdfea1a45d122c8e9a7815f8e9f4fc9054dc106bcbd2b53e4bee2c87a0a9b35bb78b11a

C:\Users\Admin\AppData\Local\Temp\_MEI48082\liblzma.dll

MD5 ca72943b95ece5777b3a32e057637210
SHA1 5d4e0de09be53043fba47d8f0acbc9f0707952cf
SHA256 ffdb2b23d1bb49dbdbab5a43328d0eeaf6b685ecd60de09dca97e5b30be3795d
SHA512 58e304346b7141cdbf5936b2e4a5746ae134da222beeb02a288b7eb5b19861d1c77d73a13d74505e87c4b5c94d78ca327098944025102f0a18c07c21ea976d74

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-crt-utility-l1-1-0.dll

MD5 54f27114eb0fda1588362bb6b5567979
SHA1 eaa07829d012206ac55fb1af5cc6a35f341d22be
SHA256 984306a3547be2f48483d68d0466b21dda9db4be304bedc9ffdb953c26cac5a1
SHA512 18d2bdce558655f2088918241efdf9297dfe4a14a5d8d9c5be539334ae26a933b35543c9071cedada5a1bb7c2b20238e9d012e64eb5bbf24d0f6b0b726c0329d

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-crt-time-l1-1-0.dll

MD5 6b33b34888ccecca636971fbea5e3de0
SHA1 ee815a158baacb357d9e074c0755b6f6c286b625
SHA256 00ac02d39b7b16406850e02ca4a6101f45d6f7b4397cc9e069f2ce800b8500b9
SHA512 f52a2141f34f93b45b90eb3bbcdb64871741f2bd5fed22eaaf35e90661e8a59eba7878524e30646206fc73920a188c070a38da9245e888c52d25e36980b35165

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-crt-string-l1-1-0.dll

MD5 96da689947c6e215a009b9c1eca5aec2
SHA1 7f389e6f2d6e5beb2a3baf622a0c0ea24bc4de60
SHA256 885309eb86dccd8e234ba05e13fe0bf59ab3db388ebfbf6b4fd6162d8e287e82
SHA512 8e86fa66a939ff3274c2147463899df575030a575c8f01573c554b760a53b339127d0d967c8cf1d315428e16e470fa1cc9c2150bb40e9b980d4ebf32e226ee89

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-crt-stdio-l1-1-0.dll

MD5 76e0a89c91a28cf7657779d998e679e5
SHA1 982b5da1c1f5b9d74af6243885bcba605d54df8c
SHA256 0189cbd84dea035763a7e52225e0f1a7dcec402734885413add324bffe688577
SHA512 d75d8798ea3c23b3998e8c3f19d0243a0c3a3262cffd8bcee0f0f0b75f0e990c9ce6644150d458e5702a8aa51b202734f7a9161e795f8121f061139ad2ea454f

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-crt-runtime-l1-1-0.dll

MD5 8b9b0d1c8b0e9d4b576d42c66980977a
SHA1 a19acefa3f95d1b565650fdbc40ef98c793358e9
SHA256 371a44ab91614a8c26d159beb872a7b43f569cb5fac8ada99ace98f264a3b503
SHA512 4b1c5730a17118b7065fada3b36944fe4e0260f77676b84453ee5042f6f952a51fd99debca835066a6d5a61ba1c5e17247551340dd02d777a44bc1cae84e6b5f

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-crt-process-l1-1-0.dll

MD5 595d79870970565be93db076afbe73b5
SHA1 ec96f7beeaec14d3b6c437b97b4a18a365534b9b
SHA256 fc50a37acc35345c99344042d7212a4ae88aa52a894cda3dcb9f6db46d852558
SHA512 152849840a584737858fc5e15f0d7802786e823a13ec5a9fc30ee032c7681deaf11c93a8cffead82dc5f73f0cd6f517f1e83b56d61d0e770cbb20e1cfff22840

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-crt-multibyte-l1-1-0.dll

MD5 4e033cfee32edf6be7847e80a5114894
SHA1 91eef52c557aefd0fde27e8df4e3c3b7f99862f2
SHA256 dff24441df89a02dde1cd984e4d3820845bafdff105458ed10d510126117115b
SHA512 e1f3d98959d68ef3d7e86ac4cb3dbdf92a34fcfd1bf0e0db45db66c65af0162ab02926dc5d98c6fc4a759a6010026ee26a9021c67c0190da941a04b783055318

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-crt-math-l1-1-0.dll

MD5 4dd7a61590d07500704e7e775255cb00
SHA1 8b35ec4676bd96c2c4508dc5f98ca471b22deed7
SHA256 a25d0654deb0cea1aef189ba2174d0f13bdf52f098d3a9ec36d15e4bfb30c499
SHA512 1086801260624cf395bf971c9fd671abddcd441ccc6a6eac55f277ccfbab752c82cb1709c8140de7b4b977397a31da6c9c8b693ae92264eb23960c8b1e0993bd

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-crt-locale-l1-1-0.dll

MD5 ab206f2943977256ca3a59e5961e3a4f
SHA1 9c1df49a8dbdc8496ac6057f886f5c17b2c39e3e
SHA256 b3b6ee98aca14cf5bc9f3bc7897bc23934bf85fc4bc25b7506fe4cd9a767047a
SHA512 baccc304b091a087b2300c10f6d18be414abb4c1575274c327104aabb5fdf975ba26a86e423fda6befb5d7564effac0c138eb1bad2d2e226131e4963c7aac5bd

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-crt-heap-l1-1-0.dll

MD5 f9e20dd3b07766307fccf463ab26e3ca
SHA1 60b4cf246c5f414fc1cd12f506c41a1043d473ee
SHA256 af47aebe065af2f045a19f20ec7e54a6e73c0c3e9a5108a63095a7232b75381a
SHA512 13c43eee9c93c9f252087cb397ff2d6b087b1dc92a47ba5493297f080e91b7c39ee5665d6bdc1a80e7320e2b085541fc798a3469b1f249b05dee26bbbb6ab706

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-crt-filesystem-l1-1-0.dll

MD5 f0d507de92851a8c0404ac78c383c5cd
SHA1 78fa03c89ea12ff93fa499c38673039cc2d55d40
SHA256 610332203d29ab218359e291401bf091bb1db1a6d7ed98ab9a7a9942384b8e27
SHA512 a65c9129ee07864f568c651800f6366bca5313ba400814792b5cc9aa769c057f357b5055988c414e88a6cd87186b6746724a43848f96a389a13e347ef5064551

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-crt-environment-l1-1-0.dll

MD5 c712515d052a385991d30b9c6afc767f
SHA1 9a4818897251cacb7fe1c6fe1be3e854985186ad
SHA256 f7c6c7ea22edd2f8bd07aa5b33cbce862ef1dcdc2226eb130e0018e02ff91dc1
SHA512 b7d1e22a169c3869aa7c7c749925a031e8bdd94c2531c6ffe9dae3b3cd9a2ee1409ca26824c4e720be859de3d4b2af637dd60308c023b4774d47afe13284dcd2

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-crt-convert-l1-1-0.dll

MD5 d53637eab49fe1fe1bd45d12f8e69c1f
SHA1 c84e41fdcc4ca89a76ae683cb390a9b86500d3ca
SHA256 83678f181f46fe77f8afe08bfc48aebb0b4154ad45b2efe9bfadc907313f6087
SHA512 94d43da0e2035220e38e4022c429a9c049d6a355a9cb4695ad4e0e01d6583530917f3b785ea6cd2592fdd7b280b9df95946243e395a60dc58ec0c94627832aeb

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-crt-conio-l1-1-0.dll

MD5 6c88d0006cf852f2d8462dfa4e9ca8d1
SHA1 49002b58cb0df2ee8d868dec335133cf225657df
SHA256 d5960c7356e8ab97d0ad77738e18c80433da277671a6e89a943c7f7257ff3663
SHA512 d081843374a43d2e9b33904d4334d49383df04ee7143a8b49600841ece844eff4e8e36b4b5966737ac931ed0350f202270e043f7003bf2748c5418d5e21c2a27

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-util-l1-1-0.dll

MD5 a1952875628359a0632be61ba4727684
SHA1 1e1a5ab47e4c2b3c32c81690b94954b7612bb493
SHA256 a41bede183fa1c70318332d6bc54ef13817aeee6d52b3ab408f95fa532b809f1
SHA512 3f86180cc085dc8c9f6d3c72f5ccc0f5a0c9048343edaf62239eb4b038799845388898408ed7e8eac5d015a9bc42ff428f74585f64f5d3467dddb1303baf4f03

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-timezone-l1-1-0.dll

MD5 f62b66f451f2daa8410ad62d453fa0a2
SHA1 4bf13db65943e708690d6256d7ddd421cc1cc72b
SHA256 48eb5b52227b6fb5be70cb34009c8da68356b62f3e707db56af957338ba82720
SHA512 d64c2a72adf40bd451341552e7e6958779de3054b0cf676b876c3ba7b86147aecba051ac08adc0c3bfb2779109f87dca706c43de3ce36e05af0ddee02bbbf419

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-sysinfo-l1-1-0.dll

MD5 df50047bbd2cf3a4b0cf0567514b464c
SHA1 f20ae25484a1c1b43748a1f0c422f48f092ad2c1
SHA256 8310d855398f83cb5b9ca3adeb358da1354557aec5c82c8ef91a29f79a47f620
SHA512 5c3bfc2ccb2ee864b99f6709677474327e85889f4c962ea0a1ef9e1e876dc88b1d8e8e0f6c1422f634ff1c84a861c34e52ee07dac7fdde505b508bea80562b9f

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-synch-l1-2-0.dll

MD5 47388f3966e732706054fe3d530ed0dc
SHA1 a9aebbbb73b7b846b051325d7572f2398f5986ee
SHA256 59c14541107f5f2b94bbf8686efee862d20114bcc9828d279de7bf664d721132
SHA512 cce1fc5bcf0951b6a76d456249997b427735e874b650e5b50b3d278621bf99e39c4fc7fee081330f20762f797be1b1c048cb057967ec7699c9546657b3e248ee

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-synch-l1-1-0.dll

MD5 6961bf5622ffcd14c16fbfc1296950a4
SHA1 5584c189216a17228cca6cd07037aaa9a8603241
SHA256 50a1542d16b42ecb3edc1edd0881744171ea52f7155e5269ad39234f0ea691de
SHA512 a4d0c15acbff4e9140ae4264fa24bd4c65fb2d1052a0b37bf281498f3b641fef563c18115511829a23340c9440f547028d36015ba38cbd51ad0744d44d5ccd87

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-string-l1-1-0.dll

MD5 b7cbc8d977a00a2574e110b01124ed40
SHA1 637e4a9946691f76e6deb69bdc21c210921d6f07
SHA256 854db7d2085caacf83d6616761d8bdcbacb54a06c9a9b171b1c1a15e7dc10908
SHA512 b415ef4092fa62d39941bf529a2032bc8b591c54ed2050ea4730f198899f147539b2c0e97f3c4f14848c71066924c1848ae5f07779a1a47ab4c5e46f02be7258

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-rtlsupport-l1-1-0.dll

MD5 2166fb99debbb1b0649c4685cf630a4a
SHA1 24f37d46dfc0ef303ef04abf9956241af55d25c9
SHA256 cdc4cfebf9cba85b0d3979befdb258c1f2cfcb79edd00da2dfbf389d080e4379
SHA512 de27d06b1f306110b42d0ed2642a555862d0ade7e56e5f2908e399f140aa5f43904e08d690bcb0d2f4d11d799ec18fa682db048da57d99cd99891e45add86371

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-profile-l1-1-0.dll

MD5 7028cf6b6b609cb0e31abd1f618e42d0
SHA1 e7e0b18a40a35bd8b0766ac72253de827432e148
SHA256 9e98b03a3ca1ebabdceb7ed9c0ceb4912bb68eb68f3e0df17f39c7a55fada31d
SHA512 d035ccfd0de316e64187c18e6e5b36e14f615f872c08740ec22ef2c12d592e37d78ab154202926a56ab01d669eb5870dff651280a882d6bf2a700c43dcd25ac2

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-processthreads-l1-1-1.dll

MD5 d699333637db92d319661286df7cc39e
SHA1 0bffb9ed366853e7019452644d26e8e8f236241b
SHA256 fe760614903e6d46a1be508dccb65cf6929d792a1db2c365fc937f2a8a240504
SHA512 6fa9ff0e45f803faf3eb9908e810a492f6f971cb96d58c06f408980ab40cba138b52d853aa0e3c68474053690dfafa1817f4b4c8fb728d613696b6c516fa0f51

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-processthreads-l1-1-0.dll

MD5 5faf9a33bab1d39dd9f820d34339b3d4
SHA1 50699041060d14576ed7bacbd44be9af80eb902a
SHA256 a1221836731c7e52c42d5809cc02b17c5ec964601631ec15a84201f423da4ac4
SHA512 73c25d1338df9aee5211fbb0e1b14e6bd853e31746c63bc46f44810622b09d52ee39b8e8a57c655da63d3d3d4025c2cba4d8673893d022417a2032ba3d935061

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-processenvironment-l1-1-0.dll

MD5 f3b4ab35a65a8d938c6b60ad59ba6e7f
SHA1 2745259f4dbbefbf6b570ee36d224abdb18719bc
SHA256 ea2972fec12305825162ae3e1ae2b6c140e840be0e7ebb51a7a77b7feeda133a
SHA512 a88afb66311494d6c15613c94555ba436cd2f75e11a49a448c9c6776dfba24cda25a44792a1e8b3e680c1ad3ad0574b43ac2328c6e41ff0832139c94b066dbf5

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-namedpipe-l1-1-0.dll

MD5 a056d4eeaae37deab8333dcc4c910a93
SHA1 cb59f1fe73c17446eb196fc0dd7d944a0cd9d81f
SHA256 593fa2aa2474508ad942bbaa0fdc9a1badd81c85b0dff1c43b90a47c23ad5fb7
SHA512 c2f811994182ef51d0c011c19336179da69357e5f284f787bcdb54f90c32768a959232a477534f7e62cd3d71a048a13e91b20042e2fe6ab108d606c7c8df9255

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-memory-l1-1-0.dll

MD5 6def20ed13972f3c3f08dba8ecf3d6cc
SHA1 9c03356cf48112563bb845479f40bf27b293e95e
SHA256 c2e887a17875d39099d662a42f58c120b9cc8a799afd87a9e49adf3faddd2b68
SHA512 5b4d2b1152bed14108dc58d358b1082e27defd1001d36cd72ec6f030a34d6caf9b01c3c1dd8a9ac66d1937fcf86a6fe3469ac93b1e76d933a8f4b51c1f782f65

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-localization-l1-2-0.dll

MD5 588bd2a8e0152e0918742c1a69038f1d
SHA1 9874398548891f6a08fc06437996f84eb7495783
SHA256 a07cc878ab5595aacd4ab229a6794513f897bd7ad14bcec353793379146b2094
SHA512 32ffe64c697f94c4db641ab3e20b0f522cf3eba9863164f1f6271d2f32529250292a16be95f32d852480bd1b59b8b0554c1e7fd7c7a336f56c048f4f56e4d62f

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-libraryloader-l1-1-0.dll

MD5 5d5fae1a17961d6ee37637f04fe99b8a
SHA1 47143a66b4a2e2ba019bf1fd07bcca9cfb8bb117
SHA256 8e01eb923fc453f927a7eca1c8aa5643e43b360c76b648088f51b31488970aa0
SHA512 9db32ec8416320dcb28f874b4679d2d47a5ae56317fdc9d2d65ebb553f1d6345c3dd0024294a671a694337683dd4e77254595a9cdbfe115c80d0ef53516d46aa

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-interlocked-l1-1-0.dll

MD5 39809cc5dabf769da8871a91a8ed9e69
SHA1 f779cdef9ded19402aa72958085213d6671ca572
SHA256 5cd00ff4731691f81ff528c4b5a2e408548107efc22cc6576048b0fdce3dfbc9
SHA512 83a8246839d28378c6f6951d7593dc98b6caa6dbca5fbd023b00b3b1a9eba0597943838c508493533c2de276c4d2f9107d890e1c9a493ee834351cff5dfd2cab

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-heap-l1-1-0.dll

MD5 cdc266896e0dbe6c73542f6dec19de23
SHA1 b4310929ccb82dd3c3a779cab68f1f9f368076f2
SHA256 87a5c5475e9c26fabfead6802dac8a62e2807e50e0d18c4bfadcb15ebf5bcbc0
SHA512 79a29041699f41938174a6ec9797faf8d6bf7764657d801cb3af15c225f8eab0135d59cfa627bd02dd7459f7b857d62299e4d082586ce690627ebdf1267ebb21

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-handle-l1-1-0.dll

MD5 cce27ff9b1e78b61955682788452f785
SHA1 a2e2a40cea25ea4fd64b8deaf4fbe4a2db94107a
SHA256 8ee2de377a045c52bbb05087ae3c2f95576edfb0c2767f40b13454f2d9f779de
SHA512 1fcec1cd70426e3895c48598dfc359839d2b3f2b1e3e94314872a866540353460ec932bf3841e5afe89aa4d6c6fac768e21ae368d68c2bb15f65960f6f5d7d5b

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-file-l2-1-0.dll

MD5 bfffa7117fd9b1622c66d949bac3f1d7
SHA1 402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2
SHA256 1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e
SHA512 b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-file-l1-2-0.dll

MD5 49c3ffd47257dbcb67a6be9ee112ba7f
SHA1 04669214375b25e2dc8a3635484e6eeb206bc4eb
SHA256 322d963d2a2aefd784e99697c59d494853d69bed8efd4b445f59292930a6b165
SHA512 bda5e6c669b04aaed89538a982ef430cef389237c6c1d670819a22b2a20bf3c22aef5cb4e73ef7837cbbd89d870693899f97cb538122059c885f4b19b7860a98

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-file-l1-1-0.dll

MD5 241338aef5e2c18c80fb1db07aa8bcdf
SHA1 9acbeef0ac510c179b319ca69cd5378d0e70504d
SHA256 56de091efe467fe23cc989c1ee21f3249a1bdb2178b51511e3bd514df12c5ccb
SHA512 b9fd37f01a58594e48fa566c41827b2b9499605d9e55c2178e83ee41c8c5f50a4df2c85efea94ca586ea0ea4a6d984ebb7ca2193e9306fcb853b147b2c76bc2d

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-errorhandling-l1-1-0.dll

MD5 a5883c68d432f593812ab3b755b808db
SHA1 51cbb7ba47802dc630c2507750432c55f5979c27
SHA256 b3715112a7ca4c6cc0efee044bd82444d3267a379e33a3ec118d87e75604204d
SHA512 27153e29e99a905fa4c8b3ede078644a3a3f29fdf7b98e387e39c5c60444e326c92afd74da8fee225f7ddf39724a0daef68ba238f3cc64fb7860172b8f29d79a

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-debug-l1-1-0.dll

MD5 9476affaac53e6e34405c4001f141805
SHA1 e7c8a6c29c3158f8b332eea5c33c3b1e044b5f73
SHA256 55574f9e80d313048c245acefd21801d0d6c908a8a5049b4c46253efaf420f89
SHA512 f8e3476a09d888caebd50da0ea2debc4006004e72af677919413655ab4595622cac524f1bc6c13406ee341ae0052a19ed83826ad530f652e73b2c65d4fa65680

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-datetime-l1-1-0.dll

MD5 16789cc09a417d7deb590fffe4ed02dc
SHA1 4940d5b92b6b80a40371f8df073bf3eb406f5658
SHA256 3b68d7ab0641de6b3e81d209b7c0d3896e4ffa76617bbadd01eb54036cdd1b07
SHA512 19e4f086cc2137ee60316b0736b3c6b3780578896df9a826edfe004bb74bee8e051c511a84d8a7ea278a5f47c82b9c955394f629ab0bb0740ecb51293d9be7b7

C:\Users\Admin\AppData\Local\Temp\_MEI48082\api-ms-win-core-console-l1-1-0.dll

MD5 e5912b05988259dad0d6d04c8a17d19b
SHA1 724f4f91041ad595e365b724a0348c83acf12bbb
SHA256 9f3608c15c5de2f577a2220ce124b530825717d778f1e3941e536a3ab691f733
SHA512 c270a622d7887f4c97232ea898f5380459c565817f0d201cdb081ee82e3002b6e6248753a68da896d3b1327f93e8e8cb0ca0dcaeef324f610e0a1c7b542c6492

C:\Users\Admin\AppData\Local\Temp\_MEI48082\LIBBZ2.dll

MD5 9ecb733cf14bbff80b005ddb38540497
SHA1 2f725f35a6602dc6a70a8339e90721d9e37dadb4
SHA256 e4ba6a29fe1611815b74da3fd55bd657564edafac7a9907b0819ff8fb091eed5
SHA512 1dc0e845b47483faca748efa6ed956570c0d00c5909f3b25200d653b5c42a1f0086426ce1f483af32c36ec83043fa8cfd1577f3823568f9faeafe438f41b9a40

C:\Users\Admin\AppData\Local\Temp\_MEI48082\_bz2.pyd

MD5 ca879a65cc4cf6713b993d7931463fac
SHA1 e693f1583f093c5db67510bc6fe5aa713b056ccd
SHA256 53414d8433d46d335212e57394facd9b4d0adcbcafe29d7e694c6501c3fc1988
SHA512 44121fb79024356a5cffd62d3acaf5d7429fc777c8328648ce772aff2a856b973fa960c65b0acdd865796e9387a121e94cd9a43f7b10616b78b0697d96e83cdd

memory/5012-266-0x00007FF948C90000-0x00007FF949180000-memory.dmp

memory/5012-265-0x00007FF948740000-0x00007FF948C81000-memory.dmp

memory/5012-267-0x00007FF959D60000-0x00007FF959FC3000-memory.dmp

memory/5012-268-0x00007FF947840000-0x00007FF947AA5000-memory.dmp

memory/5012-269-0x000001636BA10000-0x000001636BA20000-memory.dmp

C:\Users\Admin\.cache\qdarktheme\v2.1.0\expand_less_e1e5e9_180.svg

MD5 a56a3f2f01fae3a27a4c05919f7cf073
SHA1 ba7ff3f50ea8552944deb9f0654840134a43b899
SHA256 96c10457c9a1de5532073cd93dd60faf1170bc3e9ecf4c0e0229354dc7c699ae
SHA512 dd3da60e2f231f5c95910114d8067224142f8334d93cf36bfc3e1d8ab91647e30f94ca30c40a06e59fec7988e7aab5ace65152ef1e31fd4e2eb627a6df5735ae

C:\Users\Admin\.cache\qdarktheme\v2.1.0\check_box_outline_blank_e1e5e9_0.svg

MD5 ddf21ac790aeddf21debb5b7266d5cf9
SHA1 718e902e53b408c82953e59dd577bd42c3b9eb0c
SHA256 d3a2ff4bb6068e88dc01297e144e1fff1066bfdd786eece03a1c3f13bbc716a9
SHA512 ab7bead19c9d1414afd2074a3ecb4f256149d95176412c5bdc691a5f5ef84c6769812fc27c76627f6d46d23c305e9636dcd0c37c8ce8a463142cbf8cc816c2fa

C:\Users\Admin\.cache\qdarktheme\v2.1.0\arrow_drop_up_ffffff2f_0.svg

MD5 a3e7be0140798dec700d42acdc9fdfd0
SHA1 af911c83f606b36834c67658579d2c42d45615c8
SHA256 52f64194f718f1a219f6d1adcf3e68e88c69e8d844481d1a8b09960c91406e77
SHA512 fb5965b824e2506271df525e506bb7f8deca40aab18c5774a8c53471a7fe0b560f0cab09f9369cf1303f00a58b6a2c7e50da9f845f7eae1afe2b1ce18f343820

C:\Users\Admin\.cache\qdarktheme\v2.1.0\arrow_drop_up_ffffff2f_180.svg

MD5 ec24f34b962f1735f1d78aef1fc9af74
SHA1 9c8acc0a91b0bcb33fb47651f104a8f218783a79
SHA256 4995f821ea8d35c48550d1fdef88415fbbe74b3520b9a36f81f7a5ed061c0098
SHA512 ed302bd0ed19166abc8e6c02dec6e0bd2fe7760abed4ca72e3cb4fe1d5826223cc2a01e47fe7188e54068077c36fd61cceccd052e45d14b03c3a67ca2b4bb05e

C:\Windows\System32\drivers\etc\hosts

MD5 008fba141529811128b8cd5f52300f6e
SHA1 1a350b35d82cb4bd7a924b6840c36a678105f793
SHA256 ab0e454a786ef19a3ae1337f10f47354ffa9521ea5026e9e11174eca22d86e84
SHA512 80189560b6cf180a9c1ecafc90018b48541687f52f5d49b54ca25e040b3264da053e3d4dbb0cd38caaf496e23e516de18f500b333e3cda1fd1b25c6e9632defc

C:\Windows\System32\drivers\etc\hosts

MD5 b840efa4453ae81c821cbd865bc2dbd5
SHA1 9538a0e6bbdfd2d8333e9a739b3781cfcfb5a8a6
SHA256 df91ce8d51d4206d25fa6f51c2e0e963132bacef683ead20312cfacc53fb9cf9
SHA512 91f2563e4367b44731c574ed76acc7536a9a82cad270df5d29d9a4e9d2f5dd1f84a7b2eefb4db1f22723675e61da010c8794e2987609f67d85102fef7d896e0d

C:\Windows\System32\drivers\etc\hosts

MD5 39eb4d83aa3ea9072e8ac894b19e35b2
SHA1 b7e1fcc5cbd70b0405e415a030aab6a9da06ec09
SHA256 dab480b52f035296bff88bb9449d1690986f4b4ea94486418d2ea4cf35ee7eb2
SHA512 3bab73daef23cf8eb0a96b225a74433e6b4e80a227bb1240d8166b7a523c5964755df113fbc21a0430bc66c45e006635584c9df7621be856f84dc84d56a77630

C:\Windows\System32\drivers\etc\hosts

MD5 e362fd8b0e015e3a66d50f99b5e1d739
SHA1 7dc4ab5ec6c9a190ac145373afaeafb4a4c6d3cb
SHA256 f5fa407c931f6bde1b844e123ee380a8e1ddcd239e0e91a6b2a2a972f4a0a1e7
SHA512 cc32968ce03fbc9432cea54a0c41ce8452999cf93245d02248c2af447707739243231f6ff8aac86cf5232290d2553800e1ece3169196968093a3b36ceca07709

C:\Windows\System32\drivers\etc\hosts

MD5 a52759013e7493fabe7e1ff58ff36715
SHA1 280fe2af22844e8fb3c29678ec7b720136476dda
SHA256 cdc57f68a86c0560758ae1ce9418e47a545e38ac0058895163e48aa805f7c70c
SHA512 4798090e8c8ece9ee0ac6c0f2508bbd1ee7737bbffd157f42733cd41bf452c0cc67af9bef154233e21182b3480406631e49a08d4e0d6fd37ec4537b59fc561ee

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 196eaa9f7a574c29bd419f9d8c2d9349
SHA1 19982d15d1e2688903b0a3e53a8517ab537b68ed
SHA256 df1e96677bcfffe5044826aa14a11e85ef2ebb014ee9e890e723a14dc5f31412
SHA512 e066d74da36a459c19db30e68b703ec9f92019f2d5f24fd476a5fd3653c0b453871e2c08cdc47f2b4d4c4be19ff99e6ef3956d93b2d7d0a69645577d44125ac7

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 f717f56b5d8e2e057c440a5a81043662
SHA1 0ad6c9bbd28dab5c9664bad04db95fd50db36b3f
SHA256 4286cd3f23251d0a607e47eccb5e0f4af8542d38b32879d2db2ab7f4e6031945
SHA512 61e263935d51028ec0aab51b938b880945a950cec9635a0dafddf795658ea0a2dfcf9cfc0cab5459b659bb7204347b047a5c6b924fabea44ce389b1cbb9867d6

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 a99db6e930e1431e805a512d995ee15c
SHA1 1ee393040d108fc5cd39a1bfd36b713576422c1f
SHA256 6a10f9c82ea91b62066c1f2ad8a742fb695c79602c440b9c8e92bd82a821ccfd
SHA512 c03ef937347f7e9f0e121bff904de048c694004fdc3aa58abf39badcedaa90c7c578698759eb153b47e237954baab18e1199c785dbe5e29f35e71c78b497f55a

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 c6de08e5ce67613bd4c76dc95a0f8e9b
SHA1 633f50814b174c034862f820c484de6c01372e62
SHA256 e556dad3d2799efc82884f72f472c9e81958d4c770e4b380c45ee2cda016065d
SHA512 7c564956dc82b26ed39cea247cc24648bb69cbec43344f09fce6d6d68384591cd7134054580fbd1968ba03825643f02d37d26b75e597d2846c6ea854e560ee19

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 96caae06a147d7d3283c1cce56b3c503
SHA1 ff72b2c7ef161271059737e6da525b9f0a097998
SHA256 024aad5dae256a4caa7fc2ec3e90b6ae964735e79bfd79530a23ed191be43695
SHA512 0ed2d85d10738bb9572aa66dfe3b43a665b1d62591715552e4baef90ce6e9f84cf0912a836d92e209769420642561371553813f55a2f2e2420c369d7102da86a

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 807419ca9a4734feaf8d8563a003b048
SHA1 a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256 aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512 f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 8399e7516ecee15123389af482324aa3
SHA1 4e76da0b6403a7a7ac5abce66a9c6e58616884e9
SHA256 4d5a10666dace12510072b11072bfa61bd044b2d9c30d510282f5892a2061a3d
SHA512 ec2ab4379e8bc8b0dabaf2442c2dbf95acbd5223a013126e4a55fcc7cab8e9c9a614650be20b1af15ae5ea2999b9ab03ee2f7631acc1cf8930d0924f826dd30d

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 b41fea23f5042ab4470ccafb9d4126d3
SHA1 8c8b318fa4d13324d81b264e3c26a9c53a95a189
SHA256 41a8b9c6deb2a427d66f3fbe32bb6a7f9ae4cfe4551a7acf3d6759b4d06ec5ca
SHA512 6a94ba27daf51bb5bebca7ccf7fc848a3200eb1f358fc5e335442287ed482f405d0f03c1ae264b9e4862e1041f7eb5005d0d9ba75a6b4bb40e85790faca91395

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 f98b8fc2fc7b6e761224f2092e9775a0
SHA1 78d386c64e356c42646565b65569aa80f9fc9dbc
SHA256 a0280d8de7d8cce01064b24196aaa81af897a6cc4861b711b5036f62c1f4345e
SHA512 b017e26be85ed8235ea03402dd3b75c8ed96bf238e1dc57545ba05026be69a75f55144a97d02f305ad46dce43dc52a01e847bc0a85fa175ceb1028aa43a981b7

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe59386b.TMP

MD5 0ae5e83068fe27506d908a4cb916871d
SHA1 9273276d2932aa57e500dda7773b9d86e1d17cbc
SHA256 b8edd8a205c0729286e3d5ee9fda1380c1850be6f9d1ca8c07fe32bab90ecf86
SHA512 70abecf99395c1fb50cfbb67075692492160d161996bd45648d6b7b1d35ef439c4db187d9355a402a1040b75594d65ac198c63a1e95d39cd15619bc6f7718023

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 f42647086036c7e63c73ff23c2a8079d
SHA1 9a9c1885ef48043d09f11d3c289a9dd7112399a4
SHA256 028b3e30891e2c5b0bf2b2535bdd9b09bdc5ea39dfcba04c6ba640402b103a8c
SHA512 619e4317096a45e36e479e6eae8fb5c3f78b3c051a25b25f4273bbf56d0cbdd341e9faa95b7a1cbb73b04dac2aa7ef927ebb73bc2bbfa08e9c569f9a4a6e4a10

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 da5640c0a3593c9c27e2758c291d6677
SHA1 839f3ad647386bbe4cce24f0c9b1e68c326c72a8
SHA256 5bbcb8a0b411263f8657733eb830e33b5b9bce275a83c4df9cedba5fb1951580
SHA512 9a8162b2d5f115da9e695bdbc22addd713170382fd6e18fbac745304f08399f1b408f4908c24bd5a49cd2fa564948248a9ddf6bf1fb02c351cf89e89c4e2d8a8