Malware Analysis Report

2025-05-05 21:13

Sample ID 240626-teqmls1glb
Target https://cdn.discordapp.com/attachments/1255540700443971727/1255542292467421254/main.exe?ex=667d8261&is=667c30e1&hm=705c2227c37d566a2509ec220cb31bcbe70fe71a3d381f0da4926c0db016728e&
Tags
pyinstaller spyware stealer
score
8/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
8/10

Threat Level: Likely malicious

The file https://cdn.discordapp.com/attachments/1255540700443971727/1255542292467421254/main.exe?ex=667d8261&is=667c30e1&hm=705c2227c37d566a2509ec220cb31bcbe70fe71a3d381f0da4926c0db016728e& was found to be: Likely malicious.

Malicious Activity Summary

pyinstaller spyware stealer

Downloads MZ/PE file

Loads dropped DLL

Reads user/profile data of web browsers

Executes dropped EXE

Legitimate hosting services abused for malware hosting/C2

Suspicious use of NtSetInformationThreadHideFromDebugger

Detects Pyinstaller

NTFS ADS

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Enumerates system info in registry

Suspicious use of WriteProcessMemory

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-26 15:58

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-26 15:58

Reported

2024-06-26 15:59

Platform

win10v2004-20240611-en

Max time kernel

40s

Max time network

35s

Command Line

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1255540700443971727/1255542292467421254/main.exe?ex=667d8261&is=667c30e1&hm=705c2227c37d566a2509ec220cb31bcbe70fe71a3d381f0da4926c0db016728e&

Signatures

Downloads MZ/PE file

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\Downloads\main.exe N/A
N/A N/A C:\Users\Admin\Downloads\main.exe N/A

Reads user/profile data of web browsers

spyware stealer

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A

Suspicious use of NtSetInformationThreadHideFromDebugger

Description Indicator Process Target
N/A N/A C:\Users\Admin\Downloads\main.exe N/A

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

NTFS ADS

Description Indicator Process Target
File opened for modification C:\Users\Admin\Downloads\Unconfirmed 396986.crdownload:SmartScreen C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1976 wrote to memory of 2252 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2252 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2372 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2196 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 2196 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 1168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 1168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 1168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 1168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 1168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 1168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 1168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 1168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 1168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 1168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 1168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 1168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 1168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 1168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 1168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 1168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 1168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 1168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 1168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 1976 wrote to memory of 1168 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Processes

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1255540700443971727/1255542292467421254/main.exe?ex=667d8261&is=667c30e1&hm=705c2227c37d566a2509ec220cb31bcbe70fe71a3d381f0da4926c0db016728e&

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff8c9246f8,0x7fff8c924708,0x7fff8c924718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,9821624461848921023,4416235056219826544,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,9821624461848921023,4416235056219826544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,9821624461848921023,4416235056219826544,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9821624461848921023,4416235056219826544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9821624461848921023,4416235056219826544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,9821624461848921023,4416235056219826544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,9821624461848921023,4416235056219826544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5412 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9821624461848921023,4416235056219826544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9821624461848921023,4416235056219826544,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2020,9821624461848921023,4416235056219826544,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=3468 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9821624461848921023,4416235056219826544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3460 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2020,9821624461848921023,4416235056219826544,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6216 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9821624461848921023,4416235056219826544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6232 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,9821624461848921023,4416235056219826544,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6296 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2020,9821624461848921023,4416235056219826544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5652 /prefetch:8

C:\Users\Admin\Downloads\main.exe

"C:\Users\Admin\Downloads\main.exe"

C:\Users\Admin\Downloads\main.exe

"C:\Users\Admin\Downloads\main.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c cls

Network

Country Destination Domain Proto
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.133.233:443 cdn.discordapp.com tcp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 233.133.159.162.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 0.159.190.20.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
BE 88.221.83.235:443 www.bing.com tcp
US 8.8.8.8:53 235.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 discord.com udp
US 162.159.136.232:443 discord.com tcp
US 8.8.8.8:53 232.136.159.162.in-addr.arpa udp
N/A 127.0.0.1:64392 tcp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 107.12.20.2.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 b4a74bc775caf3de7fc9cde3c30ce482
SHA1 c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256 dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA512 55578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f

\??\pipe\LOCAL\crashpad_1976_WZKWEMYYYXMLJVEA

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 c5abc082d9d9307e797b7e89a2f755f4
SHA1 54c442690a8727f1d3453b6452198d3ec4ec13df
SHA256 a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512 ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 3a276532e305f197df0abef5bdab40f2
SHA1 d4ee7e8869911b74812c7d9a02af33bce1cd5c0e
SHA256 ca52eb35b3fcf2d2c13edbf46657a37f660d49b6c012368daf77424ff23af204
SHA512 774ee5823dca1791dba690e174f9b8a04d176579273c99f9dca1f901ff9ccd0e5952311d350fc5fcdc646ea72a90052a216b6a2006f5a20477e7a2132eb7b4a5

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 206702161f94c5cd39fadd03f4014d98
SHA1 bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA256 1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA512 0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 46295cac801e5d4857d09837238a6394
SHA1 44e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA256 0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA512 8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

C:\Users\Admin\Downloads\Unconfirmed 396986.crdownload

MD5 504862edfee1df9e2bfc9f7af100df2b
SHA1 a740230a5720c580de769b071c66963c2d780258
SHA256 dc0d673eabccf4bb84ba3ef4679cf440decd4ffbf9986704764402d7a60373e4
SHA512 2bd4aca871bf06fb113d20fc14f348f3fdf8685afba4bc59ed2baf8ee95e8780d716b924586f31744251a290580b87393dd4245aaae1420a1a8672493062b947

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 97fd5434177fd2f4b21296f2185e7213
SHA1 01736462c9335b718e42ae6c6325d57d8ce5b963
SHA256 9d3dcfd2d4f13db958e7266ad106dee0d3132be2bd94ee47230ff1fa46f37de9
SHA512 ceeefa505d4f1e24b80a714e730324673c9569f03d6d9015ff8c6d1683ef5f0f1626e1e722846f7ccbcd8684465a71104c3ca950c34d16b21425d346c05f42dd

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 bf38ffa90c6f11eaabd75baab0ec446e
SHA1 4cfe534f99b96ddb8ccb8499aaf48f67c9b4b84f
SHA256 5801340ee47c5faee46457b10d01ff5ca7a5158e790b7f028dae2764e57cbff9
SHA512 c88ac29d279dd6e2d152e46888fe49218b1b720c339379b3b12fafd7c86e99cacf3eca050e2ed15b7f03ed1d1e078c76ae38350cdf0d6ae56c9db91d04825ec6

C:\Users\Admin\AppData\Local\Temp\_MEI56602\python38.dll

MD5 c0ed63bf515d04803906e1b703e9cb86
SHA1 61f9a465d7a782aedfd5e2b1a9dc8bff6c103b5a
SHA256 24bfc999a733d4759ca40425610555f597b1d015f87ef5f84e15c665297247a4
SHA512 78384c34cefc40cb86913dffdc6a360668467731a8a3678d5f8377d8ae63d244b45506b0b6e2498825b53abe8fd84d2b75b3e9fef3703fead90183ace433e70a

C:\Users\Admin\AppData\Local\Temp\_MEI56602\VCRUNTIME140.dll

MD5 6ba0dbcd2db8f44243799c891dbd2a59
SHA1 30a2719d4b8667fd237bcfb781660901c993d9fc
SHA256 263988a0868053b6b01835cd2959c8f71e3f943610421b269da646f2d9e3b333
SHA512 94dea85ef50d55cec0d1bbae4671386ce8ca02e870ce417abfef0a8499fdf0bd0eb5ba38debd07c213f7da39cbea63a18143484b05e9c7ca36b2f68e4520bb4d

C:\Users\Admin\AppData\Local\Temp\_MEI56602\base_library.zip

MD5 0b773f98808ca3d2f78ab59ee1b61b8e
SHA1 041d3a56f763056ce644a4de7b1f0e3130fd11ce
SHA256 4d1cb3263036cc0562e35272555d210878e362b76c686de57da26e6873df20ee
SHA512 d8a38fa98052f9974fcc0aeff4a551cf0af4d94e7e3a67d37b98efee281ab214d41a0320889f308555ef22f5897f216ac6c4e38c12988fb8a7845fa3883355bc

C:\Users\Admin\AppData\Local\Temp\_MEI56602\_ctypes.pyd

MD5 ffde1baacbe6729ad5246068870915a4
SHA1 2d42751140fc244f19dece6b1948b2b67d36bab4
SHA256 cc839990fb1020520731c35a183c83c9dc927aa78fa6b149a92a39e9d156c8b8
SHA512 1ac3ec986c55af37eb93d35a15e8a64726e5154240c0c5aac8286f7e347c678482ec65c62b454cf237023253642335ce6b3f6c0cc084e1527e61d48aaf7752f1

C:\Users\Admin\AppData\Local\Temp\_MEI56602\libffi-7.dll

MD5 eef7981412be8ea459064d3090f4b3aa
SHA1 c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256 f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512 dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

C:\Users\Admin\AppData\Local\Temp\_MEI56602\_socket.pyd

MD5 fc47a3b4dc7353591970a20678b90a81
SHA1 5ca5436e0c66f468bb48b5ea16c69125fcc34bea
SHA256 4e7ee0ecf839c42d96c53309384737e8f84bb5e90ecd20d511cc3fc6ec135f44
SHA512 8f52f33ce49bc38a9356d46c63aef4f8f05d491377f4969f52fd84f83712faed3d9637044d27583bf06fc52687667b630ba8d2eb8ee27f4a810520df5499b725

C:\Users\Admin\AppData\Local\Temp\_MEI56602\select.pyd

MD5 f4887f1d906dc336fe0c3f7dbb720ca3
SHA1 67def676ad3569029d2a357a40a138fc7570bdcc
SHA256 36552bc64127d4866c657c9b74c0399baad70957a5380896fd8202e3a6bb7b4f
SHA512 51006d164c2512adfab92d22be5fed7c093cb647821045a6cdfd2ed7a30d94e620a446b8434b3e91d5544ef737e1492f3dc6c29cadbfdfa5e41df7fb5106a301

C:\Users\Admin\AppData\Local\Temp\_MEI56602\_ssl.pyd

MD5 bb726a022fa65d9db794e280372dbe3e
SHA1 c48e78b37e10a713380040d16145e0ef06050e8e
SHA256 87362816a16c45095ad9ac3dc174509b2a4dd794cd17f56cac356d11c992de12
SHA512 637b78e884b55e6819e64e1b8f57f8399099165b65bf5866f8d03adb1305655b4773096b80666f88c1ff65cdd0c74ee2e0bcfb3258456ddf04c47b597f4f4287

C:\Users\Admin\AppData\Local\Temp\_MEI56602\libcrypto-1_1.dll

MD5 4929f390f3b9132af172d38b22bd2a2b
SHA1 19d27dc93c402801b8cb582b3aa27b17d24403d3
SHA256 4c1cbe61f562459baf382d3153b4bfc8a651bfc4ab41c99b3c8c29e19de7fde0
SHA512 2c7f3dfaba9e2844bcfddd3b05897f97ef043cc1cd5576ec0442eb26c9740c4df69a707e28bf5c6a0796e27e8de77ea430626ec822d74e054d081d32aaae7d93

C:\Users\Admin\AppData\Local\Temp\_MEI56602\libssl-1_1.dll

MD5 facfcc9c58fe4238c847907689ddf485
SHA1 8382d1666627cd47855bc687615a9cc38eef7361
SHA256 d89a9009e10a2cb2d49771e694cd88f33d69cff0d3c92bc2d8e0b512e0ef9546
SHA512 f5d5f3e59438d6af1bcd22d85982107cc5eaea52c62243d11464a01f37172cb0aed343de68652882234349f1e0671b976fd5b6e77a532a9fa3cda7a0f77718c5

C:\Users\Admin\AppData\Local\Temp\_MEI56602\_pytransform.dll

MD5 d9c3f42655273474e85f0f8a2245291c
SHA1 03f3e1b3d5e5f19dcacf8cd3c3167988b256cc2a
SHA256 a4cad34e5a6e6a517c70687878e421332173aedb998c085a3c23f58963da63a3
SHA512 7417c812c8c46c8027a74a41c1c35adf80b09934bb1a899267e4ebb91789a2f408eda803cfc21cea6e253ad7429997eaee3d974905a439ed9dfda3a72b483c77

memory/5904-166-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-164-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-162-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-160-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-158-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-156-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-154-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-152-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-150-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-148-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-146-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-144-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-142-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-141-0x000001DEFB440000-0x000001DEFB441000-memory.dmp

memory/5904-204-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-202-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-200-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-198-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-196-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-194-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-192-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-190-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-188-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-186-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-184-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-182-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-180-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-178-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-176-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-174-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-172-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-170-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

memory/5904-168-0x000001DEFB450000-0x000001DEFB451000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI56602\_overlapped.pyd

MD5 07a111f08b382f456da32873ffe12f15
SHA1 9cc2f4e49698020b0211d837c9d30adcef9f6e72
SHA256 600c131efcb237fa992de26a3b38e472b16f731c9f14fb25c7d730bab27960c3
SHA512 f432fc289d54d8cc581efab8f623929c8d5d8625aa25f9c76bf37f335e928b15121236a3e2724fedf6d7ac55988c63caa365df4a53901109ff6b59f9360654e9

C:\Users\Admin\AppData\Local\Temp\_MEI56602\_bz2.pyd

MD5 6909da62abc73216883a89a60b66e73b
SHA1 015eb36344e5f3fe2df467bd47a04bded616b052
SHA256 4c22e0d2786dd7e93f55e1f4a1c27d2e141a55682ed2c09b90320817fcf011f9
SHA512 eddabb51b6092b3c3e3b6968ea831a262f8f5f8a26b1c95badc616ca236d0928aa789334835130ec40137ffc623b5d2031a585e890162b489a26fd990845b63a

C:\Users\Admin\AppData\Local\Temp\_MEI56602\_lzma.pyd

MD5 af8385e0cb374ae6caee59190175dd12
SHA1 a16d7d021ec3fa31fb1b2ce5929c2d3d4c96d6b8
SHA256 e414ee3efa6a4e1edf610dd780335ab9372cbe7919a73596bbb267b55ad23999
SHA512 3e4e26bbcf14ebcb4faedb8982c46b3f5318c88dd395c668c50e4f5ddbfe6c1836eb49e49e855cc95934e8247e63df0f7543f66e4fe13335558fc21c0c566b5b

C:\Users\Admin\AppData\Local\Temp\_MEI56602\multidict\_multidict.cp38-win_amd64.pyd

MD5 c43c2103add8c6c30f25b9e46e086147
SHA1 7a04d0dafcbe1036033c99d3e796422cba382796
SHA256 d31834c5ba38b1654ccecdad6423d2c15fe58593f2dfba291ca0753e5ad2f8ce
SHA512 b1d4f101543b1788c0e6137ff8c32b362082174618dc0ef888c692bde0fa54c182e4e2d8b7137e7cb20c1621336bc388aff6f88015ce4714c11254c10462e9bc

C:\Users\Admin\AppData\Local\Temp\_MEI56602\_hashlib.pyd

MD5 178b3a8bddd3bc0e832efe59c8045e4c
SHA1 cc3a48a2945f251c5f9ddc7011011b8563352978
SHA256 1e12f3528c9a33111fd6589b323b5e022d020b461ee65b0a97bd628d53217f2a
SHA512 e7ce152f3c0afdf00651cdb1173a32da837a00f988a285a71c16289a7acaeb80048e7650a30fe5d5604dfcb4c8199edce8d5eb9f9ff974779a542498a1bdd7ee

C:\Users\Admin\AppData\Local\Temp\_MEI56602\_asyncio.pyd

MD5 efb12f5663a8924b50eab1ea31084f7f
SHA1 c35c635bc566d1180bfa3885aa6a482f3d8724b9
SHA256 75d2d17cf03cf3a4aa9f51c5d71e8a8edc54e5437a5286f30d36f7182bc85e00
SHA512 11ed3c94a545ebc16e615d27329e249906448a748a931ea4b7881cce43ecd36bdedf47a473b27f2e6363f64e366fc65aa078507dfeee8487b7e545e3804b9e0d

C:\Users\Admin\AppData\Local\Temp\_MEI56602\unicodedata.pyd

MD5 eb9d4362b715f076eac021ddf7d792af
SHA1 67cbd1023cde7d75c13c79874e37226ee477230a
SHA256 4061c7fe871fc3b90baf4b540c60c61ac613ffdfcdf61f362a5e6aaa92057b47
SHA512 71202ffe8d8564b05875e7304b4024bfcdffe18fa122580968916f20923af740648638f75a66e5c7b0539503e5a26b4cc4fcd5ef779eb445952a4a68177a6fe8

C:\Users\Admin\AppData\Local\Temp\_MEI56602\yarl\_quoting_c.cp38-win_amd64.pyd

MD5 e96e99fc84249de9c4cd4649f3a27f7b
SHA1 4fcf885311d24a2ce438842bb7db269550709a00
SHA256 3730432069213e61d347d65be318c32a81dfebc56397de6a900c0b71f2aea303
SHA512 19aa039867085a5bba72308f514a614ba4703cc1299d6367b20d6ae7573f44a944f4ab46e3ea751e8a7bc63ebb97bf4fd32e60c480f31c4f9ff425725b690f79

C:\Users\Admin\AppData\Local\Temp\_MEI56602\aiohttp\_helpers.cp38-win_amd64.pyd

MD5 2d545a9007e16426d4ecfa031533b7b1
SHA1 6c55dc3229d09d7b6c8babdada885843a27dfff0
SHA256 e6c78c56e7075f7ec0f1fb74ef55c62ffb9d004996352485379ac22be96ae57e
SHA512 e6da3cca1904a424515142b5f8d920c502041ce6453646221e95db2f3a9dbf915e448b5417ad4417721db984bb4cce0760dbf135826be073565e70cc865c970a

C:\Users\Admin\AppData\Local\Temp\_MEI56602\aiohttp\_websocket.cp38-win_amd64.pyd

MD5 a6951f2b627bb3a8aac5e128ce8cd7bd
SHA1 f4a18655a763d20c608ad0bbb1a8f57220bbb29a
SHA256 5e1775564b0d30729371cb0a95bf0ba45fb6c482d636b812ae3b886263be27fc
SHA512 13539ecbb8f254bedfc6141091b46ca7f19e088048beaac4e70aa6819cf3cdbea9aa628dbf52ed64179657cf20b75e4fadd5c59f2e46e1b8457c9f6dc63903dc

C:\Users\Admin\AppData\Local\Temp\_MEI56602\aiohttp\_http_parser.cp38-win_amd64.pyd

MD5 c327436c70ed4e13224224d04a3de93b
SHA1 fb2079814b6eca812d0c2e007b4d9f8f9669c59b
SHA256 c0beff21ef3359b44c1b2043d8e88ecad11d73f4c2864f754cb93244ccbf737e
SHA512 251ba03b1003489de583596e667c5cf5adc2cbc669978ca2adbd6b6e5a2f24e623e6a37c5236ce125752ad52b97b65af8d1cce550433b06c3d2e6c91b7cea27f

C:\Users\Admin\AppData\Local\Temp\_MEI56602\aiohttp\_http_writer.cp38-win_amd64.pyd

MD5 74124a7f54e34e8e70aa10ad5876c9a5
SHA1 8a3dfecf15595a2200cd12afa4a862016bb95c38
SHA256 87f9a4a82ffd1386eba1287ffbd2958e4acaf0b1683eec4f0d229ec468ac80ea
SHA512 ea79f05ea91d8e6542999860815df6b43232771605f7a9bceaecb2b959e16e5e927c4f933686fe2843a090afe98cc5833528cd12d7369daca6eed3c3366df7e7

C:\Users\Admin\AppData\Local\Temp\_MEI56602\aiohttp\_frozenlist.cp38-win_amd64.pyd

MD5 18e1e6cdc93b7ce0f582d7435a3ad25b
SHA1 6bd37d4ecdb28c47d7b15d0db02a69aa37122437
SHA256 af88140d5b11d09fd188cbd198f9e5f21807f1d1cb236464720862acab38c92e
SHA512 afade75860b64f98badc709bd6099942aa56579bfa03a19cc12d1ae7e453a119d84abdd886277f3ad2664c08decad371d3bc9675b9bdbb43f078819082f58fd7

C:\Users\Admin\AppData\Local\Temp\_MEI56602\certifi\cacert.pem

MD5 1ba3b44f73a6b25711063ea5232f4883
SHA1 1b1a84804f896b7085924f8bf0431721f3b5bdbe
SHA256 bb77f13d3fbec9e98bbf28ac95046b44196c7d8f55ab7720061e99991a829197
SHA512 0dd2a14331308b1de757d56fab43678431e0ad6f5f5b12c32fa515d142bd955f8be690b724e07f41951dd03c9fee00e604f4e0b9309da3ea438c8e9b56ca581b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 744483989a23bc4d0877a2032de1e207
SHA1 13801957763206cfd6caf935fac60a8d9470d24b
SHA256 83f112630f7fc6318a7c473558ce8de2d63ee3a50e9238f285eceebcabe20a5a
SHA512 5837c4bb8956aae228bd6a49b9feb75465c51bc72bc3dbf957727531c1b6be95ae905aa741a9b2b589f66f0569ef45dfd7e5a859b2b9807debaf05a9e1b1efe2