Malware Analysis Report

2024-11-15 07:41

Sample ID 240802-yvn6yataqf
Target Token generator.exe
SHA256 4ebc5284438a60472271187a188e77e852762e573676505556ccf56b19946e62
Tags
pyinstaller pysilon discovery evasion execution persistence upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

4ebc5284438a60472271187a188e77e852762e573676505556ccf56b19946e62

Threat Level: Known bad

The file Token generator.exe was found to be: Known bad.

Malicious Activity Summary

pyinstaller pysilon discovery evasion execution persistence upx

Pysilon family

Detect Pysilon

Enumerates VirtualBox DLL files

Sets file to hidden

Command and Scripting Interpreter: PowerShell

Loads dropped DLL

Executes dropped EXE

UPX packed file

Adds Run key to start application

Legitimate hosting services abused for malware hosting/C2

Detects Pyinstaller

Browser Information Discovery

Unsigned PE

Suspicious use of SetWindowsHookEx

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

Modifies data under HKEY_USERS

Kills process with taskkill

Suspicious use of WriteProcessMemory

Enumerates system info in registry

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

Suspicious behavior: EnumeratesProcesses

Views/modifies file attributes

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-02 20:06

Signatures

Detect Pysilon

Description Indicator Process Target
N/A N/A N/A N/A

Pysilon family

pysilon

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-02 20:06

Reported

2024-08-02 20:09

Platform

win10-20240404-en

Max time kernel

150s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Token generator.exe"

Signatures

Enumerates VirtualBox DLL files

Description Indicator Process Target
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\Imagelogger\Imagelogger.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\Imagelogger\Imagelogger.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\Imagelogger\Imagelogger.exe N/A
N/A N/A C:\Users\Admin\Imagelogger\Imagelogger.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Imagelogger = "C:\\Users\\Admin\\Imagelogger\\Imagelogger.exe" C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133671028459063966" C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\Imagelogger\Imagelogger.exe N/A
N/A N/A C:\Users\Admin\Imagelogger\Imagelogger.exe N/A
N/A N/A C:\Users\Admin\Imagelogger\Imagelogger.exe N/A
N/A N/A C:\Users\Admin\Imagelogger\Imagelogger.exe N/A
N/A N/A C:\Users\Admin\Imagelogger\Imagelogger.exe N/A
N/A N/A C:\Users\Admin\Imagelogger\Imagelogger.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\Imagelogger\Imagelogger.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 33 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 34 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 35 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 36 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Imagelogger\Imagelogger.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 33 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 34 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 35 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 36 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Imagelogger\Imagelogger.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3832 wrote to memory of 4044 N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe C:\Users\Admin\AppData\Local\Temp\Token generator.exe
PID 3832 wrote to memory of 4044 N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe C:\Users\Admin\AppData\Local\Temp\Token generator.exe
PID 4044 wrote to memory of 4416 N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe C:\Windows\system32\cmd.exe
PID 4044 wrote to memory of 4416 N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe C:\Windows\system32\cmd.exe
PID 4044 wrote to memory of 4860 N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4044 wrote to memory of 4860 N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4044 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe C:\Windows\system32\cmd.exe
PID 4044 wrote to memory of 2732 N/A C:\Users\Admin\AppData\Local\Temp\Token generator.exe C:\Windows\system32\cmd.exe
PID 2732 wrote to memory of 1824 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 2732 wrote to memory of 1824 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 2732 wrote to memory of 1372 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\Imagelogger\Imagelogger.exe
PID 2732 wrote to memory of 1372 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\Imagelogger\Imagelogger.exe
PID 2732 wrote to memory of 4208 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 2732 wrote to memory of 4208 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 1372 wrote to memory of 5952 N/A C:\Users\Admin\Imagelogger\Imagelogger.exe C:\Users\Admin\Imagelogger\Imagelogger.exe
PID 1372 wrote to memory of 5952 N/A C:\Users\Admin\Imagelogger\Imagelogger.exe C:\Users\Admin\Imagelogger\Imagelogger.exe
PID 5952 wrote to memory of 6064 N/A C:\Users\Admin\Imagelogger\Imagelogger.exe C:\Windows\system32\cmd.exe
PID 5952 wrote to memory of 6064 N/A C:\Users\Admin\Imagelogger\Imagelogger.exe C:\Windows\system32\cmd.exe
PID 5952 wrote to memory of 6252 N/A C:\Users\Admin\Imagelogger\Imagelogger.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5952 wrote to memory of 6252 N/A C:\Users\Admin\Imagelogger\Imagelogger.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 6740 wrote to memory of 6792 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6792 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6956 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6964 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 6964 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 7020 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 6740 wrote to memory of 7020 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Token generator.exe

"C:\Users\Admin\AppData\Local\Temp\Token generator.exe"

C:\Users\Admin\AppData\Local\Temp\Token generator.exe

"C:\Users\Admin\AppData\Local\Temp\Token generator.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x3c8

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Imagelogger\""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\Imagelogger\activate.bat

C:\Windows\system32\attrib.exe

attrib +s +h .

C:\Users\Admin\Imagelogger\Imagelogger.exe

"Imagelogger.exe"

C:\Windows\system32\taskkill.exe

taskkill /f /im "Token generator.exe"

C:\Users\Admin\Imagelogger\Imagelogger.exe

"Imagelogger.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Imagelogger\""

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xcc,0xd0,0xd4,0xa8,0xd8,0x7ffd20df9758,0x7ffd20df9768,0x7ffd20df9778

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1792,i,10384418195272965293,3502473521803422031,131072 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1856 --field-trial-handle=1792,i,10384418195272965293,3502473521803422031,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2120 --field-trial-handle=1792,i,10384418195272965293,3502473521803422031,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2948 --field-trial-handle=1792,i,10384418195272965293,3502473521803422031,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2956 --field-trial-handle=1792,i,10384418195272965293,3502473521803422031,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4016 --field-trial-handle=1792,i,10384418195272965293,3502473521803422031,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4920 --field-trial-handle=1792,i,10384418195272965293,3502473521803422031,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5020 --field-trial-handle=1792,i,10384418195272965293,3502473521803422031,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3640 --field-trial-handle=1792,i,10384418195272965293,3502473521803422031,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=5064 --field-trial-handle=1792,i,10384418195272965293,3502473521803422031,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3864 --field-trial-handle=1792,i,10384418195272965293,3502473521803422031,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3228 --field-trial-handle=1792,i,10384418195272965293,3502473521803422031,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 --field-trial-handle=1792,i,10384418195272965293,3502473521803422031,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3612 --field-trial-handle=1792,i,10384418195272965293,3502473521803422031,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3024 --field-trial-handle=1792,i,10384418195272965293,3502473521803422031,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.15063.0 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2516 --field-trial-handle=1792,i,10384418195272965293,3502473521803422031,131072 /prefetch:2

Network

Country Destination Domain Proto
N/A 127.0.0.1:53721 tcp
US 8.8.8.8:53 discord.com udp
US 162.159.137.232:443 discord.com tcp
US 162.159.138.232:443 discord.com tcp
US 8.8.8.8:53 232.137.159.162.in-addr.arpa udp
US 162.159.128.233:443 discord.com tcp
US 162.159.135.232:443 discord.com tcp
US 8.8.8.8:53 233.128.159.162.in-addr.arpa udp
US 8.8.8.8:53 232.138.159.162.in-addr.arpa udp
US 8.8.8.8:53 232.135.159.162.in-addr.arpa udp
US 162.159.136.232:443 discord.com tcp
US 8.8.8.8:53 232.136.159.162.in-addr.arpa udp
US 8.8.8.8:53 www.google.com udp
NL 142.250.27.147:443 www.google.com tcp
NL 142.250.27.147:443 www.google.com tcp
NL 142.250.27.147:443 www.google.com tcp
NL 142.250.27.147:443 www.google.com tcp
US 8.8.8.8:53 147.27.250.142.in-addr.arpa udp
NL 142.250.27.147:443 www.google.com udp
US 8.8.8.8:53 clients2.google.com udp
N/A 224.0.0.251:5353 udp
NL 142.250.102.100:443 clients2.google.com tcp
US 8.8.8.8:53 94.27.250.142.in-addr.arpa udp
US 8.8.8.8:53 95.27.250.142.in-addr.arpa udp
US 8.8.8.8:53 100.102.250.142.in-addr.arpa udp
US 8.8.8.8:53 discord.com udp
US 162.159.135.232:443 discord.com tcp
US 162.159.135.232:443 discord.com tcp
US 8.8.8.8:53 cdn.prod.website-files.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 cdn.localizeapi.com udp
US 162.159.135.232:443 discord.com udp
US 104.18.29.203:443 cdn.prod.website-files.com tcp
NL 142.250.102.95:443 ajax.googleapis.com tcp
NL 142.250.102.95:443 ajax.googleapis.com tcp
US 104.22.21.64:443 cdn.localizeapi.com tcp
US 8.8.8.8:53 apps.identrust.com udp
US 8.8.8.8:53 35.58.20.217.in-addr.arpa udp
US 8.8.8.8:53 203.29.18.104.in-addr.arpa udp
US 8.8.8.8:53 64.21.22.104.in-addr.arpa udp
US 8.8.8.8:53 95.102.250.142.in-addr.arpa udp
US 8.8.8.8:53 94.102.250.142.in-addr.arpa udp
GB 23.200.147.10:80 apps.identrust.com tcp
US 8.8.8.8:53 d3e54v103j8qbb.cloudfront.net udp
BE 18.239.190.77:443 d3e54v103j8qbb.cloudfront.net tcp
US 104.18.29.203:443 cdn.prod.website-files.com udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 8.8.8.8:53 assets.website-files.com udp
US 162.159.130.233:443 cdn.discordapp.com tcp
BE 18.239.208.121:443 assets.website-files.com tcp
BE 18.239.208.121:443 assets.website-files.com tcp
BE 18.239.208.121:443 assets.website-files.com tcp
BE 18.239.208.121:443 assets.website-files.com tcp
BE 18.239.208.121:443 assets.website-files.com tcp
US 162.159.130.233:443 cdn.discordapp.com tcp
US 162.159.130.233:443 cdn.discordapp.com tcp
US 162.159.130.233:443 cdn.discordapp.com tcp
US 162.159.130.233:443 cdn.discordapp.com tcp
US 162.159.130.233:443 cdn.discordapp.com tcp
US 8.8.8.8:53 10.147.200.23.in-addr.arpa udp
US 8.8.8.8:53 77.190.239.18.in-addr.arpa udp
US 8.8.8.8:53 233.130.159.162.in-addr.arpa udp
US 8.8.8.8:53 121.208.239.18.in-addr.arpa udp
US 8.8.8.8:53 19.208.239.18.in-addr.arpa udp
US 8.8.8.8:53 geolocation.onetrust.com udp
US 104.18.29.203:443 cdn.prod.website-files.com udp
US 104.18.28.127:443 geolocation.onetrust.com tcp
US 8.8.8.8:53 97.27.250.142.in-addr.arpa udp
US 8.8.8.8:53 127.28.18.104.in-addr.arpa udp
US 8.8.8.8:53 www.youtube.com udp
NL 142.250.102.93:443 www.youtube.com tcp
US 8.8.8.8:53 a.nel.cloudflare.com udp
US 35.190.80.1:443 a.nel.cloudflare.com tcp
NL 142.250.102.93:443 www.youtube.com udp
US 8.8.8.8:53 93.102.250.142.in-addr.arpa udp
US 35.190.80.1:443 a.nel.cloudflare.com udp
US 8.8.8.8:53 1.80.190.35.in-addr.arpa udp
US 8.8.8.8:53 remote-auth-gateway.discord.gg udp
US 162.159.133.234:443 remote-auth-gateway.discord.gg tcp
US 8.8.8.8:53 content-autofill.googleapis.com udp
NL 142.250.102.95:443 content-autofill.googleapis.com tcp
US 8.8.8.8:53 234.133.159.162.in-addr.arpa udp
US 8.8.8.8:53 beacons.gcp.gvt2.com udp
US 8.8.8.8:53 7.173.189.20.in-addr.arpa udp
US 142.250.69.3:443 beacons.gcp.gvt2.com tcp
NL 142.250.102.100:443 clients2.google.com udp
US 8.8.8.8:53 3.69.250.142.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI38322\python310.dll

MD5 b805cebb0242b3bbfe810a19c2b44e3d
SHA1 62d71b686b64e6efd58852a5e59f4b00cec18f30
SHA256 2d2d5746d6a066fcc3e7b8c041ffb7c7722c14b148aed923387dbacc951d732b
SHA512 d46a5b3274aed182d30647d461d1dc7bd2599a43b1914d5a5e882c4298ecf4f11c64272db351257f836806ae55d5f1a0c1369f4159df09c8d7aea9a52d2e1acd

C:\Users\Admin\AppData\Local\Temp\_MEI38322\VCRUNTIME140.dll

MD5 f34eb034aa4a9735218686590cba2e8b
SHA1 2bc20acdcb201676b77a66fa7ec6b53fa2644713
SHA256 9d2b40f0395cc5d1b4d5ea17b84970c29971d448c37104676db577586d4ad1b1
SHA512 d27d5e65e8206bd7923cf2a3c4384fec0fc59e8bc29e25f8c03d039f3741c01d1a8c82979d7b88c10b209db31fbbec23909e976b3ee593dc33481f0050a445af

memory/4044-1264-0x00007FFD20A40000-0x00007FFD20EA6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI38322\base_library.zip

MD5 1c8ec53e2919898f5a29213b52ab1d80
SHA1 95e4139c9b0129808fd3e096c6aba84b3b5a7828
SHA256 f6745a7425aa38b8a70fbc6d98275748d7485d1d8bcb815b8f69e0fda52869b5
SHA512 7fbcb4034f5d9a0994c0b7ce500daec9575289f45b2289c432c259a09493bd9eadc813d942dfa6927d404f56624e31f4fc999f7104d9487f584f24a2fcd42e0d

C:\Users\Admin\AppData\Local\Temp\_MEI38322\_ctypes.pyd

MD5 3df3965a4861ad800bb2a59fae6d1ac0
SHA1 16bac0309f2e1cdfa7a68aa758fcd665086cf2cc
SHA256 2978cbba8e8605467392c3e08cf6b857910d51d661c01224774e9dc8fd759a5e
SHA512 9f8f8ff6002be45439bf892fc8b2087060947408060163eab7706fd825f1db9e07ff6edf5a3f19ab36e7e3a7e7cb57d262db2b6050d3cb1a0fdd165150029451

C:\Users\Admin\AppData\Local\Temp\_MEI38322\python3.DLL

MD5 fd4a39e7c1f7f07cf635145a2af0dc3a
SHA1 05292ba14acc978bb195818499a294028ab644bd
SHA256 dc909eb798a23ba8ee9f8e3f307d97755bc0d2dc0cb342cedae81fbbad32a8a9
SHA512 37d3218bc767c44e8197555d3fa18d5aad43a536cfe24ac17bf8a3084fb70bd4763ccfd16d2df405538b657f720871e0cd312dfeb7f592f3aac34d9d00d5a643

C:\Users\Admin\AppData\Local\Temp\_MEI38322\libffi-7.dll

MD5 36b9af930baedaf9100630b96f241c6c
SHA1 b1d8416250717ed6b928b4632f2259492a1d64a4
SHA256 d2159e1d1c9853558b192c75d64033e09e7de2da2b3f1bf26745124ed33fbf86
SHA512 5984b32a63a4440a13ebd2f5ca0b22f1391e63ac15fe67a94d4a579d58b8bb0628980a2be484ac65ad3a215bbe44bd14fe33ec7b3581c6ab521f530395847dd5

memory/4044-1273-0x00007FFD30A40000-0x00007FFD30A64000-memory.dmp

memory/4044-1274-0x00007FFD330E0000-0x00007FFD330EF000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI38322\_bz2.pyd

MD5 8be644c64a05f3fa54cda06ca3342fa1
SHA1 6ce140b2f709a77087c497d49425583fd285f9e2
SHA256 5a33ca97cd32e517d9f80fceaa8322a17255bff555bd7e29c8b29b126d493dd4
SHA512 ec614aec09e09c0fbff82cb4f318fa41adc992507287ee9559164e223bafbfdc13082ce558ca2b019d0f275b51b95d7a74f5aaef0e2c9a26b05e6212e0231ab6

memory/4044-1277-0x00007FFD307C0000-0x00007FFD307D8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI38322\_lzma.pyd

MD5 81534509a5816e2807f758a484482851
SHA1 debaf2d93852c0a8103411290c76f38b511dc86d
SHA256 83d0e0c2763074671605b62f64513dc9e4ff61e010b30e3d740b430b797edace
SHA512 21f00c5f7fb8c7560563a32aab3a2c30a7c2803bfa2647e83fc5d9e5016e359dfda28af128ec4671b763085d301685f904ae111120dc3ca9452b41eec323165f

C:\Users\Admin\AppData\Local\Temp\_MEI38322\freetype.dll

MD5 04a9825dc286549ee3fa29e2b06ca944
SHA1 5bed779bf591752bb7aa9428189ec7f3c1137461
SHA256 50249f68b4faf85e7cd8d1220b7626a86bc507af9ae400d08c8e365f9ab97cde
SHA512 0e937e4de6cbc9d40035b94c289c2798c77c44fc1dc7097201f9fab97c7ff9e56113c06c51693f09908283eda92945b36de67351f893d4e3162e67c078cff4ec

C:\Users\Admin\AppData\Local\Temp\_MEI38322\pyexpat.pyd

MD5 f94a88c380d6dd7adead8b0b199b13e9
SHA1 45aa9c8b4a320218bb4a201be5bb21468d57cea0
SHA256 8b2ad9632805eb0706308a05cc12d408c8218f2f288e3ac0228157854b09f342
SHA512 bd6bdbc53ccc250b1280193cabbc1292354fda7a81d24e4e85274b2c5fc045bfed9d30e220ac6816a3db040869eed2b784a7db484908c34290548710172f870f

C:\Users\Admin\AppData\Local\Temp\_MEI38322\_uuid.pyd

MD5 b68c98113c8e7e83af56ba98ff3ac84a
SHA1 448938564559570b269e05e745d9c52ecda37154
SHA256 990586f2a2ba00d48b59bdd03d3c223b8e9fb7d7fab6d414bac2833eb1241ca2
SHA512 33c69199cba8e58e235b96684346e748a17cc7f03fc068cfa8a7ec7b5f9f6fa90d90b5cdb43285abf8b4108e71098d4e87fb0d06b28e2132357964b3eea3a4f8

\Users\Admin\AppData\Local\Temp\_MEI38322\_hashlib.pyd

MD5 0bb17caffaa89863db4e223813b9f952
SHA1 1d2342843f9edfba5dbfd7aae5389bf316f9436b
SHA256 4aff993259490341a0079811135af3a3a7ea3a44461fa3cdc8324f84dce26bd8
SHA512 888b844e153342a833e4b96be323012de178a5d70517532cae1cba43ba5d427242901756e4d0f4b53e89208d57b4ad1991d22de1032eddb695d62ddeafaf5c5b

\Users\Admin\AppData\Local\Temp\_MEI38322\libcrypto-1_1.dll

MD5 dcd4e9410cd8612a111de1f21956bd03
SHA1 c8ac617549d23e2f1d8978be072d56120b41db2e
SHA256 32e71ee0a601dd330b1224f92af42bc2343327ebd345a2f82991102c61aaff51
SHA512 7a96a53a567a446bcdf123a86c3a3c8934445e619fbf08b95fea4cbccf2f41151b992233993255cdd0335ac685b4dae7abb96b7f371fd3d630a9edded78e5236

C:\Users\Admin\AppData\Local\Temp\_MEI38322\_tkinter.pyd

MD5 bc56cbd9b1e60a3b507e5d2f3bc588c0
SHA1 54eb74a4b668047fb18a3e8515f9958ed8911785
SHA256 cbe7498b93eeeb52b918327aa46be2141566c819775356938483859fa717a705
SHA512 d756860858ee137574961a5acf6e3c069479454f1ade185c36fb054b5a71c1777362c041d15db65d6ce873eb187367934fefefc3c285fbc7a2d9ceca82ec99e2

\Users\Admin\AppData\Local\Temp\_MEI38322\_ssl.pyd

MD5 12c16b30fa43a3f80118a37506206f6e
SHA1 19d301147f4350b92a0979e5eedee7786f7490b5
SHA256 298e9d466f679b09f95d65dc846a09eebde089318bc09a777e55dff0c8be087b
SHA512 68b50e1208344627199bd87f4296340be09bfb1696d3ee781869c7591108d623189dede197f4fb7f11a729e9e3faa87cb3add72e60d63af8466a27356eb0ce8f

\Users\Admin\AppData\Local\Temp\_MEI38322\charset_normalizer\md.cp310-win_amd64.pyd

MD5 7568ff19fec3c28472dc2a86fc0df3a4
SHA1 ee85f762f30537b24e1ce3735ccff8fd833b3b2f
SHA256 32d3b38090be0e405089fbd173aa9b36c821fbd6b9b55a87c53491844d0de4f1
SHA512 9b68ae10bf803c446f244336dc7086bbcfba16264a8a7957e972beedb9dddecd862649948bb4a3d2857fd885ba972cefcef7880a79f6d534c4689950cb1c3d69

memory/4044-1329-0x00007FFD30480000-0x00007FFD30495000-memory.dmp

memory/4044-1337-0x00007FFD301E0000-0x00007FFD30206000-memory.dmp

memory/4044-1338-0x00007FFD2E560000-0x00007FFD2E678000-memory.dmp

memory/4044-1341-0x00007FFD30180000-0x00007FFD3018B000-memory.dmp

memory/4044-1344-0x00007FFD30150000-0x00007FFD3015C000-memory.dmp

memory/4044-1343-0x00007FFD30160000-0x00007FFD3016B000-memory.dmp

memory/4044-1342-0x00007FFD30170000-0x00007FFD3017C000-memory.dmp

memory/4044-1340-0x00007FFD30190000-0x00007FFD3019B000-memory.dmp

memory/4044-1339-0x00007FFD301A0000-0x00007FFD301D8000-memory.dmp

memory/4044-1336-0x00007FFD30210000-0x00007FFD3021B000-memory.dmp

memory/4044-1335-0x00007FFD30220000-0x00007FFD3022D000-memory.dmp

memory/4044-1334-0x00007FFD30230000-0x00007FFD302E8000-memory.dmp

memory/4044-1333-0x00007FFD302F0000-0x00007FFD3031E000-memory.dmp

memory/4044-1332-0x00007FFD30320000-0x00007FFD3032D000-memory.dmp

memory/4044-1331-0x00007FFD30460000-0x00007FFD30479000-memory.dmp

memory/4044-1330-0x00007FFD2FA00000-0x00007FFD2FD79000-memory.dmp

memory/4044-1328-0x00007FFD304A0000-0x00007FFD304CC000-memory.dmp

\Users\Admin\AppData\Local\Temp\_MEI38322\_queue.pyd

MD5 057d6f0e16f8dbcd62b931c793bf6426
SHA1 157e2a5f748ea02c83641f35696cbf630c269d8e
SHA256 4d95c7b8ab48f9efdbd60d9182a6c84bb8cf07016b02b3946f3c3fae47dc67a4
SHA512 43a72f688058423553ecb95f3eb698d9b7ef0a972fc476e58e3bab517c56b1971eed9e2bcf02ec1c4eb845aa0001caf820d798f29c900c805b9293eea35c36f3

\Users\Admin\AppData\Local\Temp\_MEI38322\libssl-1_1.dll

MD5 d8b6d2da0374b0ea1ee4c84fba94a073
SHA1 3a00d6af23d54ec54ab1d09b6a9dc422aa9b0658
SHA256 4a27997d7de463b1fb7bbb7b18508bdbb173248e0f985fdc040cedd15c79e8d9
SHA512 c47809eb65f8f949d8328bbbaf523e42533d132d06e890cc02cb24273872b5867fa5e35de7d8cd12c8d3c707729b2448ebe32edbe0fee66f8daa8cea56fa838c

\Users\Admin\AppData\Local\Temp\_MEI38322\select.pyd

MD5 e51cbc710092a9510a2e87ddb288a2c8
SHA1 083faa71d120d291e74afb0543ec3923b3a7c05a
SHA256 c781971a01bef8e8bb8816daef7dc9bbd6c12369245012a75e1aedb0e4114741
SHA512 be8ba3ff18fb06bfbcffe9cf3755687bb99b6fd24f263ad74de70adee9213b6935a592d33aa5190674b466227060c6047f8b12a3371347a3cfb0abf472c7af29

\Users\Admin\AppData\Local\Temp\_MEI38322\_socket.pyd

MD5 6cd63b5163e516c6ad0d998931201029
SHA1 89fcdde70127d6354adc532b6048d2bd83069766
SHA256 ceee059a56e67503030889fa509ead1ae7538c66ab94994001ef04c88640ac92
SHA512 7e01ddbf89042eaec6c85bb7c424bd1dcfcbcf7d6c1c9df833628ba7333ce9f1229c56c156ef91e2cd5ed9e2f6259a784fcf17ebce60cca0d2d291e57a1598a7

C:\Users\Admin\AppData\Local\Temp\_MEI38322\_sqlite3.pyd

MD5 bc5578ea189d7c36b84df19828a20501
SHA1 67f9533dd4034f7507930ef099bbc5e38129f09f
SHA256 e44b6d6b20f50b18a26a6dc59b123d6a1c6a6b762e34d43c6367abbbd3da6041
SHA512 8070d8228ae396aa884481df5ac7644adbd0e3ccd7013ee2dce56cde7747186c6b5472746ad4f5b7f5b8a3a45d0738961f48ca9225a2651bc4ae172d1fce6a02

C:\Users\Admin\AppData\Local\Temp\_MEI38322\_overlapped.pyd

MD5 c7b1b9efb1eabc5c1ed42edd333ed6a8
SHA1 9346385c47db37bb1a90a1afe76b0e9571ac0135
SHA256 e7b30d4dbcc7dd56d61d8b621d3aa88b7b801a657952c524da1da8f6d1969d40
SHA512 d310b4d478fd581387f0ad4fb0d6114b2db57629fcfbced647b2d7f26ed3340a8b1235d8d0ad0cab63842f68a1304bc94f0c3290889ba2ecf3b51b3be7a8e25a

C:\Users\Admin\AppData\Local\Temp\_MEI38322\_multiprocessing.pyd

MD5 75a2848078395d1e3cce45ac1a52ebf5
SHA1 70d768d52c51d74affa4fb818b7ccaa06de6c558
SHA256 560f38d191cae490962aba2ccee6b31e17a8d51c90166e0af121b5dff96ef924
SHA512 2b2aa3b19e7dfce2175bfb9a60ed1606b4f34282f7de982ec70e4f590e1e3c9d5981605ecdd4b4e030df428d6cc93320a5bf266e5e22a8774614f4c38db5c110

memory/4044-1347-0x00007FFD30120000-0x00007FFD3012C000-memory.dmp

memory/4044-1346-0x00007FFD30130000-0x00007FFD3013C000-memory.dmp

memory/4044-1345-0x00007FFD30140000-0x00007FFD3014B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI38322\_elementtree.pyd

MD5 5ace50ea191f5b9b23bc41da5d5b7226
SHA1 9bcfd60467265ef652804adf3ae69334efa57f9f
SHA256 dabed22cf882f3e494d6eee0caa088ccc661240897de3aeafcb2dc540dd42bd8
SHA512 69779287b6aa868ec03bfb5df9ebfea3477603a093ef8b334ebb9f8a0ad7c1fbdd1245249ba922b2015e0c08009e50533c7c92a72eab895573ae12ad76636bf0

C:\Users\Admin\AppData\Local\Temp\_MEI38322\_decimal.pyd

MD5 f308517bee83fa8b9a2393a949907e21
SHA1 821c506ae1d02f17764b10801ab72034d94106ea
SHA256 a73c3fac2adfc8e4f6d33aac226f09ba0a7ec02f3df0205bb6c155b533804af1
SHA512 11f7d1574b9a1892c4ad95d9f8ec1b351294c326ff21cf04897c9d32ed584b25a48778a489d12dddff6dbe2a4c833faee8ab34bc58355b4299ae7c6178e02818

C:\Users\Admin\AppData\Local\Temp\_MEI38322\_cffi_backend.cp310-win_amd64.pyd

MD5 d968ebcdbec08ebaa42356ca155ac6a1
SHA1 7953a0a9c7c38349d629968a1dbd7e3bf9e9933c
SHA256 670379d72b8ac580f237a7236c4b51933b2576e8dd7689e09b9e58d55818a979
SHA512 5dbfb6e928f8b96d03dd4dabf2c21f8e22a3e0983152c167e768e9e1b6771432d706d5250032ba3ffb067198fb2a18bf3e05b09ddbc84c2ec945f3d865a57ef7

C:\Users\Admin\AppData\Local\Temp\_MEI38322\_asyncio.pyd

MD5 e70260b36b01adec2d4ea149c51d5ae7
SHA1 36127c697e77258bee84ec0dc543e211a2856853
SHA256 af589fc66a197c187b283bbc311c8a9251f6a8c45f400cd65d841239ec905286
SHA512 34fb0a1e4cfc7e0d5f52ee0e2d7dba1930c8e4f94f365515453e24c5f5771486447d70a8826e281f1af2cab2010ae9f4588b9acfae7c2d506a87309095de5fd5

C:\Users\Admin\AppData\Local\Temp\_MEI38322\zlib1.dll

MD5 ee06185c239216ad4c70f74e7c011aa6
SHA1 40e66b92ff38c9b1216511d5b1119fe9da6c2703
SHA256 0391066f3e6385a9c0fe7218c38f7bd0b3e0da0f15a98ebb07f1ac38d6175466
SHA512 baae562a53d491e19dbf7ee2cff4c13d42de6833036bfdaed9ed441bcbf004b68e4088bd453b7413d60faaf1b334aee71241ba468437d49050b8ccfa9232425d

C:\Users\Admin\AppData\Local\Temp\_MEI38322\VCRUNTIME140_1.dll

MD5 135359d350f72ad4bf716b764d39e749
SHA1 2e59d9bbcce356f0fece56c9c4917a5cacec63d7
SHA256 34048abaa070ecc13b318cea31425f4ca3edd133d350318ac65259e6058c8b32
SHA512 cf23513d63ab2192c78cae98bd3fea67d933212b630be111fa7e03be3e92af38e247eb2d3804437fd0fda70fdc87916cd24cf1d3911e9f3bfb2cc4ab72b459ba

C:\Users\Admin\AppData\Local\Temp\_MEI38322\unicodedata.pyd

MD5 57f99474530a6c9c1d187d18bd5463ce
SHA1 4454a66d48adc2806260f4fff00a6009be869fac
SHA256 195930c1b330eafacd7c408087cd9ce967e06f301974d7a64e21c4b531b2e091
SHA512 fb70b4c486125c010bdd3f5214e2d2c207b43e20ce70a4452ef58813af7a6019a8a3de463141b58939de11ce90c592232e70df73ad55c591b7cb06f0ebe9e77e

C:\Users\Admin\AppData\Local\Temp\_MEI38322\tk86t.dll

MD5 19adc6ec8b32110665dffe46c828c09f
SHA1 964eca5250e728ea2a0d57dda95b0626f5b7bf09
SHA256 6d134200c9955497c5829860f7373d99eec8cbe4936c8e777b996da5c3546ba7
SHA512 4baa632c45a97dc2ca0f0b52fd3882d083b9d83a88e0fa2f29b269e16ad7387029423839756ee052348589b216509a85f5d6ee05a1e8a1850ce5d673ae859c27

C:\Users\Admin\AppData\Local\Temp\_MEI38322\tcl86t.dll

MD5 2ac611c106c5271a3789c043bf36bf76
SHA1 1f549bff37baf84c458fc798a8152cc147aadf6e
SHA256 7410e4e74a3f5941bb161fc6fc8675227de2ad28a1cec9b627631faa0ed330e6
SHA512 3763a63f45fc48f0c76874704911bcefe0ace8d034f9af3ea1401e60aa993fda6174ae61b951188bec009a14d7d33070b064e1293020b6fd4748bee5c35bbd08

C:\Users\Admin\AppData\Local\Temp\_MEI38322\sqlite3.dll

MD5 3ba6e7250b30b61aa13fab9a70a6735a
SHA1 a0609137a1659a8ed0e565443ed92827c6c2b3d8
SHA256 90ac063f58ae3030d9400b904b46a49126171e7e8202cb093c13d045adb52b9d
SHA512 4d4e8fb67e4a7d71ce81cb40e0ec553d2380827ab4947c25c437366645c94b6bd27108134836299c74cf2481264fad4e849b5fd523dfb494f1dee4907e000778

C:\Users\Admin\AppData\Local\Temp\_MEI38322\SDL2_ttf.dll

MD5 eb0ce62f775f8bd6209bde245a8d0b93
SHA1 5a5d039e0c2a9d763bb65082e09f64c8f3696a71
SHA256 74591aab94bb87fc9a2c45264930439bbc0d1525bf2571025cd9804e5a1cd11a
SHA512 34993240f14a89179ac95c461353b102ea74e4180f52c206250bb42c4c8427a019ea804b09a6903674ac00ab2a3c4c686a86334e483110e79733696aa17f4eb6

C:\Users\Admin\AppData\Local\Temp\_MEI38322\SDL2_mixer.dll

MD5 b7b45f61e3bb00ccd4ca92b2a003e3a3
SHA1 5018a7c95dc6d01ba6e3a7e77dd26c2c74fd69bc
SHA256 1327f84e3509f3ccefeef1c12578faf04e9921c145233687710253bf903ba095
SHA512 d3449019824124f3edbda57b3b578713e9c9915e173d31566cd8e4d18f307ac0f710250fe6a906dd53e748db14bfa76ec1b58a6aef7d074c913679a47c5fdbe7

C:\Users\Admin\AppData\Local\Temp\_MEI38322\SDL2_image.dll

MD5 25e2a737dcda9b99666da75e945227ea
SHA1 d38e086a6a0bacbce095db79411c50739f3acea4
SHA256 22b27380d4f1f217f0e5d5c767e5c244256386cd9d87f8ddf303baaf9239fc4c
SHA512 63de988387047c17fd028a894465286fd8f6f8bd3a1321b104c0ceb5473e3e0b923153b4999143efbdd28684329a33a5b468e43f25214037f6cddd4d1884adb8

C:\Users\Admin\AppData\Local\Temp\_MEI38322\SDL2.dll

MD5 ec3c1d17b379968a4890be9eaab73548
SHA1 7dbc6acee3b9860b46c0290a9b94a344d1927578
SHA256 aaa11e97c3621ed680ff2388b91acb394173b96a6e8ffbf3b656079cd00a0b9f
SHA512 06a7880ec80174b48156acd6614ab42fb4422cd89c62d11a7723a3c872f213bfc6c1006df8bdc918bb79009943d2b65c6a5c5e89ad824d1a940ddd41b88a1edb

C:\Users\Admin\AppData\Local\Temp\_MEI38322\portmidi.dll

MD5 0df0699727e9d2179f7fd85a61c58bdf
SHA1 82397ee85472c355725955257c0da207fa19bf59
SHA256 97a53e8de3f1b2512f0295b5de98fa7a23023a0e4c4008ae534acdba54110c61
SHA512 196e41a34a60de83cb24caa5fc95820fd36371719487350bc2768354edf39eeb6c7860ff3fd9ecf570abb4288523d7ab934e86e85202b9753b135d07180678cd

C:\Users\Admin\AppData\Local\Temp\_MEI38322\libwebp-7.dll

MD5 b0dd211ec05b441767ea7f65a6f87235
SHA1 280f45a676c40bd85ed5541ceb4bafc94d7895f3
SHA256 fc06b8f92e86b848a17eaf7ed93464f54ed1f129a869868a74a75105ff8ce56e
SHA512 eaeb83e46c8ca261e79b3432ec2199f163c44f180eb483d66a71ad530ba488eb4cdbd911633e34696a4ccc035e238bc250a8247f318aa2f0cd9759cad4f90fff

C:\Users\Admin\AppData\Local\Temp\_MEI38322\libtiff-5.dll

MD5 ebad1fa14342d14a6b30e01ebc6d23c1
SHA1 9c4718e98e90f176c57648fa4ed5476f438b80a7
SHA256 4f50820827ac76042752809479c357063fe5653188654a6ba4df639da2fbf3ca
SHA512 91872eaa1f3f45232ab2d753585e650ded24c6cc8cc1d2a476fa98a61210177bd83570c52594b5ad562fc27cb76e034122f16a922c6910e4ed486da1d3c45c24

C:\Users\Admin\AppData\Local\Temp\_MEI38322\libpng16-16.dll

MD5 55009dd953f500022c102cfb3f6a8a6c
SHA1 07af9f4d456ddf86a51da1e4e4c5b54b0cf06ddb
SHA256 20391787cba331cfbe32fbf22f328a0fd48924e944e80de20ba32886bf4b6fd2
SHA512 4423d3ec8fef29782f3d4a21feeac9ba24c9c765d770b2920d47b4fb847a96ff5c793b20373833b4ff8bc3d8fa422159c64beffb78ce5768ed22742740a8c6c6

C:\Users\Admin\AppData\Local\Temp\_MEI38322\libopusfile-0.dll

MD5 2d5274bea7ef82f6158716d392b1be52
SHA1 ce2ff6e211450352eec7417a195b74fbd736eb24
SHA256 6dea07c27c0cc5763347357e10c3b17af318268f0f17c7b165325ce524a0e8d5
SHA512 9973d68b23396b3aa09d2079d18f2c463e807c9c1fdf4b1a5f29d561e8d5e62153e0c7be23b63975ad179b9599ff6b0cf08ebdbe843d194483e7ec3e7aeb232a

C:\Users\Admin\AppData\Local\Temp\_MEI38322\libopus-0.x64.dll

MD5 e56f1b8c782d39fd19b5c9ade735b51b
SHA1 3d1dc7e70a655ba9058958a17efabe76953a00b4
SHA256 fa8715dd0df84fdedbe4aa17763b2ab0db8941fa33421b6d42e25e59c4ae8732
SHA512 b7702e48b20a8991a5c537f5ba22834de8bb4ba55862b75024eace299263963b953606ee29e64d68b438bb0904273c4c20e71f22ccef3f93552c36fb2d1b2c46

C:\Users\Admin\AppData\Local\Temp\_MEI38322\libopus-0.dll

MD5 3fb9d9e8daa2326aad43a5fc5ddab689
SHA1 55523c665414233863356d14452146a760747165
SHA256 fd8de9169ccf53c5968eec0c90e9ff3a66fb451a5bf063868f3e82007106b491
SHA512 f263ea6e0fab84a65fe3a9b6c0fe860919eee828c84b888a5aa52dea540434248d1e810a883a2aff273cd9f22c607db966dd8776e965be6d2cfe1b50a1af1f57

C:\Users\Admin\AppData\Local\Temp\_MEI38322\libogg-0.dll

MD5 0d65168162287df89af79bb9be79f65b
SHA1 3e5af700b8c3e1a558105284ecd21b73b765a6dc
SHA256 2ec2322aec756b795c2e614dab467ef02c3d67d527ad117f905b3ab0968ccf24
SHA512 69af81fd2293c31f456b3c78588bb6a372fe4a449244d74bfe5bfaa3134a0709a685725fa05055cfd261c51a96df4b7ebd8b9e143f0e9312c374e54392f8a2c2

C:\Users\Admin\AppData\Local\Temp\_MEI38322\libmodplug-1.dll

MD5 2bb2e7fa60884113f23dcb4fd266c4a6
SHA1 36bbd1e8f7ee1747c7007a3c297d429500183d73
SHA256 9319bf867ed6007f3c61da139c2ab8b74a4cb68bf56265a101e79396941f6d3b
SHA512 1ddd4b9b9238c1744e0a1fe403f136a1def8df94814b405e7b01dd871b3f22a2afe819a26e08752142f127c3efe4ebae8bfd1bd63563d5eb98b4644426f576b2

C:\Users\Admin\AppData\Local\Temp\_MEI38322\libjpeg-9.dll

MD5 c22b781bb21bffbea478b76ad6ed1a28
SHA1 66cc6495ba5e531b0fe22731875250c720262db1
SHA256 1eed2385030348c84bbdb75d41d64891be910c27fab8d20fc9e85485fcb569dd
SHA512 9b42cad4a715680a27cd79f466fd2913649b80657ff042528cba2946631387ed9fb027014d215e1baf05839509ca5915d533b91aa958ae0525dea6e2a869b9e4

C:\Users\Admin\AppData\Local\Temp\_MEI38322\crypto_clipper.json

MD5 8bff94a9573315a9d1820d9bb710d97f
SHA1 e69a43d343794524b771d0a07fd4cb263e5464d5
SHA256 3f7446866f42bcbeb8426324d3ea58f386f3171abe94279ea7ec773a4adde7d7
SHA512 d5ece1ea9630488245c578cb22d6d9d902839e53b4550c6232b4fb9389ef6c5d5392426ea4a9e3c461979d6d6aa94ddf3b2755f48e9988864788b530cdfcf80f

memory/4044-1349-0x00007FFD30100000-0x00007FFD3010C000-memory.dmp

memory/4044-1354-0x00007FFD2F9C0000-0x00007FFD2F9CD000-memory.dmp

memory/4044-1355-0x00007FFD20A40000-0x00007FFD20EA6000-memory.dmp

memory/4044-1353-0x00007FFD2F9D0000-0x00007FFD2F9DC000-memory.dmp

memory/4044-1359-0x00007FFD2EB10000-0x00007FFD2EB20000-memory.dmp

memory/4044-1358-0x00007FFD2E9F0000-0x00007FFD2EA04000-memory.dmp

memory/4044-1357-0x00007FFD2F9B0000-0x00007FFD2F9BC000-memory.dmp

memory/4044-1356-0x00007FFD2EA10000-0x00007FFD2EA22000-memory.dmp

memory/4044-1352-0x00007FFD2F9E0000-0x00007FFD2F9EC000-memory.dmp

memory/4044-1351-0x00007FFD2F9F0000-0x00007FFD2F9FB000-memory.dmp

memory/4044-1350-0x00007FFD300F0000-0x00007FFD300FB000-memory.dmp

memory/4044-1348-0x00007FFD30110000-0x00007FFD3011E000-memory.dmp

memory/4044-1361-0x00007FFD307C0000-0x00007FFD307D8000-memory.dmp

memory/4044-1362-0x00007FFD2E9A0000-0x00007FFD2E9C2000-memory.dmp

memory/4044-1360-0x00007FFD2E9D0000-0x00007FFD2E9E4000-memory.dmp

memory/4044-1364-0x00007FFD2E4D0000-0x00007FFD2E4E9000-memory.dmp

memory/4044-1367-0x00007FFD301A0000-0x00007FFD301D8000-memory.dmp

memory/4044-1366-0x00007FFD2E4B0000-0x00007FFD2E4C1000-memory.dmp

memory/4044-1365-0x00007FFD2DC90000-0x00007FFD2DCDC000-memory.dmp

memory/4044-1363-0x00007FFD2E4F0000-0x00007FFD2E507000-memory.dmp

memory/4044-1368-0x00007FFD2DC70000-0x00007FFD2DC8E000-memory.dmp

memory/4044-1369-0x00007FFD2DBF0000-0x00007FFD2DC4D000-memory.dmp

memory/4044-1370-0x00007FFD30120000-0x00007FFD3012C000-memory.dmp

memory/4044-1372-0x00007FFD2C140000-0x00007FFD2C16E000-memory.dmp

memory/4044-1371-0x00007FFD2DBC0000-0x00007FFD2DBE9000-memory.dmp

memory/4044-1373-0x00007FFD2DB90000-0x00007FFD2DBAF000-memory.dmp

memory/4044-1374-0x00007FFD20230000-0x00007FFD203AA000-memory.dmp

memory/4044-1376-0x00007FFD2EB10000-0x00007FFD2EB20000-memory.dmp

memory/4044-1377-0x00007FFD2DB40000-0x00007FFD2DB58000-memory.dmp

memory/4044-1375-0x00007FFD2E9F0000-0x00007FFD2EA04000-memory.dmp

memory/4044-1386-0x00007FFD20220000-0x00007FFD2022B000-memory.dmp

memory/4044-1385-0x00007FFD22BC0000-0x00007FFD22BCC000-memory.dmp

memory/4044-1384-0x00007FFD2DC90000-0x00007FFD2DCDC000-memory.dmp

memory/4044-1383-0x00007FFD2E4F0000-0x00007FFD2E507000-memory.dmp

memory/4044-1382-0x00007FFD28DF0000-0x00007FFD28DFB000-memory.dmp

memory/4044-1381-0x00007FFD2E9A0000-0x00007FFD2E9C2000-memory.dmp

memory/4044-1380-0x00007FFD2C0E0000-0x00007FFD2C0EC000-memory.dmp

memory/4044-1379-0x00007FFD2D100000-0x00007FFD2D10B000-memory.dmp

memory/4044-1378-0x00007FFD2D110000-0x00007FFD2D11B000-memory.dmp

memory/4044-1387-0x00007FFD2DC70000-0x00007FFD2DC8E000-memory.dmp

memory/4044-1395-0x00007FFD201B0000-0x00007FFD201BC000-memory.dmp

memory/4044-1394-0x00007FFD201C0000-0x00007FFD201CB000-memory.dmp

memory/4044-1393-0x00007FFD201D0000-0x00007FFD201DB000-memory.dmp

memory/4044-1392-0x00007FFD201E0000-0x00007FFD201EC000-memory.dmp

memory/4044-1391-0x00007FFD201F0000-0x00007FFD201FE000-memory.dmp

memory/4044-1390-0x00007FFD20200000-0x00007FFD2020C000-memory.dmp

memory/4044-1389-0x00007FFD20210000-0x00007FFD2021C000-memory.dmp

memory/4044-1388-0x00007FFD2DBF0000-0x00007FFD2DC4D000-memory.dmp

memory/4044-1396-0x00007FFD2DBC0000-0x00007FFD2DBE9000-memory.dmp

memory/4044-1401-0x00007FFD20160000-0x00007FFD2016C000-memory.dmp

memory/4044-1399-0x00007FFD20190000-0x00007FFD2019D000-memory.dmp

memory/4044-1398-0x00007FFD201A0000-0x00007FFD201AC000-memory.dmp

memory/4044-1397-0x00007FFD2C140000-0x00007FFD2C16E000-memory.dmp

memory/4044-1400-0x00007FFD20170000-0x00007FFD20182000-memory.dmp

memory/4044-1402-0x00007FFD2DB90000-0x00007FFD2DBAF000-memory.dmp

memory/4044-1403-0x00007FFD20120000-0x00007FFD20155000-memory.dmp

memory/4044-1404-0x00007FFD20230000-0x00007FFD203AA000-memory.dmp

memory/4044-1405-0x00007FFD20060000-0x00007FFD2011C000-memory.dmp

memory/4044-1407-0x00007FFD20030000-0x00007FFD2005B000-memory.dmp

memory/4044-1406-0x00007FFD2DB40000-0x00007FFD2DB58000-memory.dmp

memory/4044-1408-0x00007FFD1FD50000-0x00007FFD2002F000-memory.dmp

memory/4044-1409-0x00007FFD1DC50000-0x00007FFD1FD43000-memory.dmp

memory/4044-1413-0x00007FFD1DC00000-0x00007FFD1DC21000-memory.dmp

memory/4044-1412-0x00007FFD1DC30000-0x00007FFD1DC47000-memory.dmp

memory/4044-1414-0x00007FFD1DBD0000-0x00007FFD1DBF2000-memory.dmp

memory/4044-1415-0x00007FFD1DB30000-0x00007FFD1DBCC000-memory.dmp

memory/4044-1417-0x00007FFD1DAC0000-0x00007FFD1DAF3000-memory.dmp

memory/4044-1416-0x00007FFD1DB00000-0x00007FFD1DB30000-memory.dmp

memory/4044-1418-0x00007FFD1DA70000-0x00007FFD1DAB8000-memory.dmp

memory/4044-1420-0x00007FFD1DA30000-0x00007FFD1DA49000-memory.dmp

memory/4044-1419-0x00007FFD1DA50000-0x00007FFD1DA6A000-memory.dmp

memory/4044-1421-0x00007FFD1DA10000-0x00007FFD1DA2D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_bodct4h2.any.ps1

MD5 c4ca4238a0b923820dcc509a6f75849b
SHA1 356a192b7913b04c54574d18c28d46e6395428ab
SHA256 6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA512 4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

memory/4044-1514-0x00007FFD2FA00000-0x00007FFD2FD79000-memory.dmp

memory/4044-1528-0x00007FFD2E4F0000-0x00007FFD2E507000-memory.dmp

memory/4044-1527-0x00007FFD2E9A0000-0x00007FFD2E9C2000-memory.dmp

memory/4044-1526-0x00007FFD2E9D0000-0x00007FFD2E9E4000-memory.dmp

memory/4044-1517-0x00007FFD302F0000-0x00007FFD3031E000-memory.dmp

memory/4044-1508-0x00007FFD20A40000-0x00007FFD20EA6000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI13722\cryptography-43.0.0.dist-info\INSTALLER

MD5 365c9bfeb7d89244f2ce01c1de44cb85
SHA1 d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256 ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512 d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

memory/5952-4001-0x00007FFD2E4E0000-0x00007FFD2E4EC000-memory.dmp

memory/5952-4012-0x00007FFD1C8E0000-0x00007FFD1C902000-memory.dmp

memory/5952-4011-0x00007FFD1FEA0000-0x00007FFD1FEBF000-memory.dmp

memory/5952-4010-0x00007FFD2C100000-0x00007FFD2C117000-memory.dmp

memory/5952-4009-0x00007FFD2C120000-0x00007FFD2C142000-memory.dmp

memory/5952-4008-0x00007FFD2C150000-0x00007FFD2C164000-memory.dmp

memory/5952-4007-0x00007FFD2D110000-0x00007FFD2D120000-memory.dmp

memory/5952-4006-0x00007FFD2DB40000-0x00007FFD2DB54000-memory.dmp

memory/5952-4005-0x00007FFD2E4B0000-0x00007FFD2E4BC000-memory.dmp

memory/5952-4004-0x00007FFD2DB90000-0x00007FFD2DBA2000-memory.dmp

memory/5952-4003-0x00007FFD2E4C0000-0x00007FFD2E4CD000-memory.dmp

memory/5952-4002-0x00007FFD2E4D0000-0x00007FFD2E4DC000-memory.dmp

memory/5952-4000-0x00007FFD2E4F0000-0x00007FFD2E4FB000-memory.dmp

memory/5952-3999-0x00007FFD2E500000-0x00007FFD2E50B000-memory.dmp

memory/5952-3998-0x00007FFD2E560000-0x00007FFD2E56C000-memory.dmp

memory/5952-3997-0x00007FFD2E570000-0x00007FFD2E57E000-memory.dmp

memory/5952-3996-0x00007FFD2E580000-0x00007FFD2E58C000-memory.dmp

memory/5952-3995-0x00007FFD2E590000-0x00007FFD2E59C000-memory.dmp

memory/5952-3994-0x00007FFD2E5A0000-0x00007FFD2E5AB000-memory.dmp

memory/5952-3993-0x00007FFD2E5B0000-0x00007FFD2E5BC000-memory.dmp

memory/5952-3992-0x00007FFD2E970000-0x00007FFD2E97B000-memory.dmp

memory/5952-3991-0x00007FFD2E9A0000-0x00007FFD2E9AC000-memory.dmp

memory/5952-3990-0x00007FFD2E9B0000-0x00007FFD2E9BB000-memory.dmp

memory/5952-3989-0x00007FFD2EB10000-0x00007FFD2EB1B000-memory.dmp

memory/5952-3988-0x00007FFD2E9C0000-0x00007FFD2E9F8000-memory.dmp

memory/5952-3987-0x00007FFD20010000-0x00007FFD20128000-memory.dmp

memory/5952-3986-0x00007FFD2EA00000-0x00007FFD2EA26000-memory.dmp

memory/5952-3985-0x00007FFD2F9B0000-0x00007FFD2F9BB000-memory.dmp

memory/5952-3984-0x00007FFD300F0000-0x00007FFD300FD000-memory.dmp

memory/5952-3983-0x00007FFD2E5C0000-0x00007FFD2E678000-memory.dmp

memory/5952-3982-0x00007FFD2F9C0000-0x00007FFD2F9EE000-memory.dmp

memory/5952-3981-0x00007FFD30A40000-0x00007FFD30A4D000-memory.dmp

memory/5952-3980-0x00007FFD30100000-0x00007FFD30119000-memory.dmp

memory/5952-3973-0x00007FFD204B0000-0x00007FFD20916000-memory.dmp

memory/5952-3978-0x00007FFD30460000-0x00007FFD30475000-memory.dmp

memory/5952-3977-0x00007FFD30120000-0x00007FFD3014C000-memory.dmp

memory/5952-3976-0x00007FFD307C0000-0x00007FFD307D8000-memory.dmp

memory/5952-3975-0x00007FFD330E0000-0x00007FFD330EF000-memory.dmp

memory/5952-3974-0x00007FFD30150000-0x00007FFD30174000-memory.dmp

memory/5952-3979-0x00007FFD20130000-0x00007FFD204A9000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 8832274f3dad0ff992efe5803415f5da
SHA1 8221039ed554cdb383ac03ccf0f8e79dab396f74
SHA256 33f2aa60ce193e983ad1dac60c721e4eafdcc7b1c345a1371745bfba2672dc7e
SHA512 6b72360f47b26dda264af19a22f10cfc91f397a45fe5e32d9fc9244b8c4573552ea4adde00b24f80f8ba12eb5e68484998062fc3e8b8cb906aeea7905d13c357

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\persisted_first_party_sets.json

MD5 99914b932bd37a50b983c5e7c90ae93b
SHA1 bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA256 44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA512 27c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd

memory/5952-4038-0x00007FFD204B0000-0x00007FFD20916000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 5fe8df1d3e636a3d46b298965d878849
SHA1 53c4a137dea9654252b3f8a4c55d2cc2f3b6e3e1
SHA256 4a786c0d8713a4ca59b08c34a60a0c03b21ab8e5ff1f3ebde07a7669639553ba
SHA512 2783c067c9d33c2e92aaf8454375e14e47578e0db954d0376e0e32547a5f8b8ccab072411e34cd017100b6f30ca7282df712303bc37f8e7d5a72a4c4754686de

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 8154f617beaa6d66d2c96f327141543d
SHA1 70be114722e3aaa3f100d01010efaea82ac8f649
SHA256 dd1950a40194612d1825763c1496f4bf4169ddf4a1a9229aea9b5db4803d5203
SHA512 c3f37a8d55d4243450654fa6ed8659ca3874a9cac587b16aaa8dd828b2273d05616ff07b66975085eef6888f47ed56b00171bc4e23bf9c39805603e3fc2449ab

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 c1caf66b3f3444c8ee6af768ff088ffe
SHA1 19b9f88707ef6003f4b05dbe27a62950fc188073
SHA256 ae59fe38cf6eba35aa12bcdf412b76defc23bbb5c18a4d0e584d6dc46e2112a7
SHA512 039ee65b0806de2d3b9e5be14deae12c04bedf6b5085a2ac8f8f29d68fc2368f766177e502d893f47180523c9b8f770567759232b625df487c1a60fd07b617ec

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 85ef01b248c50430d885ca1a95fde717
SHA1 f897783f3a41981c00280670d3e83cd0b163be1c
SHA256 66b65c7626aa593ca19e4264035624db56f6f60964e20737f3ffe02a17114afd
SHA512 6cbd256073684290b9e7fa97f35ab5ca37260a88cb20af5e29e0ab4ee6de6dc5c791f5bd4bfa0ae48d97ebcdf512147a89b92acfac06485167fdfe5ece00338f

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 a78f2c3ec4ef3b288ecbcdd63ba4a3c4
SHA1 815267f2f667748b97174fc1af7a30846ca7c4dd
SHA256 0214b1e876e0006ee8cad0f8bf20d944d6ca53376d6f84ea2beb2cb94f1d232b
SHA512 5f82a80f65cd5be1d52d81364e72417f5ae9e3e562755a664b238bf560c5efcbf1700f0482eb8c74387f5aeda48096c8b1d48726df0ebe36ad81ee42aa599c71

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 7a9648e1fb1b916560872ccff70af091
SHA1 01176a4848fbc5b4a14ab8829bf5d8f19362e8c0
SHA256 557f89ccb2a4fb6bd588e2ac9c5a925d846ad08ce2498303c61058ac5c552f46
SHA512 dfaf1b4872048e124d1388084f9ca02d335329a6060edd861db9959cb66e829e28057371d0a32aaf80ac02c5551935be26df310aa7c029954067f399190ecf3d

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 16dfe13dfa5cfdba578c697e60128631
SHA1 f35b40e54f868b1006fdd921f55738d4b1f50dda
SHA256 b938c4dec8d9f63cc318b465241780a5d0a65d331194dc04acca1a7f10c5f08a
SHA512 9ad94d5659c5db23331173ff51cee48b26c6bc299b54688b6cf5e47042b992d36f86c2071e459e7d7048ac78c17e8ecd439b59c324ff06b5be57f3901167ba98

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 d9690b45285bfcd948754ce106278ca4
SHA1 0954980cf00ebbc33360521e056e9f6f713600f6
SHA256 20c3ceff06eca3568aea08c99159b552ebc9c6b49b128e5c0896bc48851da8e5
SHA512 ab2375d1c3c1db8572eab564478d0934b6326d67d211f198cbf96ebda0dc6936cf1a42fcc365faa933a805cef5a6a6b52097f3cdc12b7772006198ac070cae00

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 1f748b1684c5f43a9b9a6f437a3e57a3
SHA1 cec99ddd732f9e5e3a9df026eaa6c9d7b5186a18
SHA256 9826571464a03795342fc4a60493cff0f1e36725164e3db068d5726f87a317b2
SHA512 cbf0128c0dba3db829649d7b1ca8b54fadac87b30eba4721777c5ce31f6f0f2d1c62639c33daad51beec1ca7b47ca619f8121ee5586bf74212f1db51b1d24a43

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 cfe988a84457498dbe3d911bc7e3b37b
SHA1 a5ca283aae846bb9b56a3cd39a06d61839d1b014
SHA256 9067b7e2df8d60e0af7351ac2a0978c8e69de6b9137d6d6e2f76e720ae16cde6
SHA512 dead15df59501089fd024efc974c09e55fb10462a09a3f9a4531a1d1de61907970b8d94ebdc2b0375c89db359d4fc612773d72da34ee2e36ce5e67974a9cfd83

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 d88195cf3dc9cd862063429fec4f7f92
SHA1 70344d8df3e03739a2deee6f08aa10e0f04f15cf
SHA256 dec8e1d7b60e6526880c72393e47986ab02ea06e24e1f08d6648f963a0c06aa2
SHA512 4d82b5ad34f9278b98d91b63b40332faf917bee8faedb23f52e5f17bd9b08d0e5024d68a05b4ecfe3bcb8962253fd0fff04033124a9fe56844e27c6d79f22e79

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 6239660c6b453624a13a786e63ed0f67
SHA1 c482ab531293350396078e8c0fedfb321c008ee7
SHA256 f697acd48c648a9a9d09f34191d393b9a33ebee47a3b1431f54c24ba632909c9
SHA512 6f5657915ebf6ab28326af3b606e7346e6020865e9c63408460cba1335fa2ffeeb221dde8822cd212e31cdd617a5d1186398b7c9289d76a64ddcb5475ad7bf53

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 ef3160a66644ab30c2baf90aa8acf639
SHA1 7e5b1bb041c6cc27e3d0cce7738730154f52843a
SHA256 c51f07372110291d75b207185e91c193d2eed2894419ed594895320c8605ceec
SHA512 ba66c148ac0faeda661a25c69c89a8ed5e1e1ce32ce30610fef2833ffc209df0fa7826ea92c07d71723d2115a534a733d9e462459b61ff0d54896b9a89cebcb8