Malware Analysis Report

2024-11-30 12:40

Sample ID 240817-2z72dsvdnj
Target PepperX.exe
SHA256 ed1477fa6d1db3dd075261632e9c3fa3dd05205607e039941d18a9945aeecb56
Tags
pyinstaller pysilon upx discovery evasion execution persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

ed1477fa6d1db3dd075261632e9c3fa3dd05205607e039941d18a9945aeecb56

Threat Level: Known bad

The file PepperX.exe was found to be: Known bad.

Malicious Activity Summary

pyinstaller pysilon upx discovery evasion execution persistence

Pysilon family

Detect Pysilon

Enumerates VirtualBox DLL files

Sets file to hidden

Command and Scripting Interpreter: PowerShell

UPX packed file

Loads dropped DLL

Executes dropped EXE

Legitimate hosting services abused for malware hosting/C2

Adds Run key to start application

Detects Pyinstaller

Browser Information Discovery

Unsigned PE

Enumerates system info in registry

Suspicious use of SendNotifyMessage

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of WriteProcessMemory

Checks SCSI registry key(s)

Kills process with taskkill

Modifies registry class

Suspicious use of AdjustPrivilegeToken

Suspicious use of FindShellTrayWindow

Views/modifies file attributes

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-17 23:02

Signatures

Detect Pysilon

Description Indicator Process Target
N/A N/A N/A N/A

Pysilon family

pysilon

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-17 23:02

Reported

2024-08-17 23:05

Platform

win7-20240708-en

Max time kernel

14s

Max time network

16s

Command Line

"C:\Users\Admin\AppData\Local\Temp\PepperX.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\PepperX.exe

"C:\Users\Admin\AppData\Local\Temp\PepperX.exe"

C:\Users\Admin\AppData\Local\Temp\PepperX.exe

"C:\Users\Admin\AppData\Local\Temp\PepperX.exe"

Network

N/A

Files

C:\Users\Admin\AppData\Local\Temp\_MEI29042\setuptools\_vendor\importlib_metadata-8.0.0.dist-info\INSTALLER

MD5 365c9bfeb7d89244f2ce01c1de44cb85
SHA1 d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256 ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512 d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

C:\Users\Admin\AppData\Local\Temp\_MEI29042\setuptools\_vendor\jaraco.text-3.12.1.dist-info\LICENSE

MD5 141643e11c48898150daa83802dbc65f
SHA1 0445ed0f69910eeaee036f09a39a13c6e1f37e12
SHA256 86da0f01aeae46348a3c3d465195dc1ceccde79f79e87769a64b8da04b2a4741
SHA512 ef62311602b466397baf0b23caca66114f8838f9e78e1b067787ceb709d09e0530e85a47bbcd4c5a0905b74fdb30df0cc640910c6cc2e67886e5b18794a3583f

C:\Users\Admin\AppData\Local\Temp\_MEI29042\setuptools\_vendor\jaraco.text-3.12.1.dist-info\WHEEL

MD5 43136dde7dd276932f6197bb6d676ef4
SHA1 6b13c105452c519ea0b65ac1a975bd5e19c50122
SHA256 189eedfe4581172c1b6a02b97a8f48a14c0b5baa3239e4ca990fbd8871553714
SHA512 e7712ba7d36deb083ebcc3b641ad3e7d19fb071ee64ae3a35ad6a50ee882b20cd2e60ca1319199df12584fe311a6266ec74f96a3fb67e59f90c7b5909668aee1

C:\Users\Admin\AppData\Local\Temp\_MEI29042\python312.dll

MD5 36e9be7e881d1dc29295bf7599490241
SHA1 5b6746aedac80f0e6f16fc88136bcdcbd64b3c65
SHA256 ebef43e92267a17f44876c702c914aafa46b997b63223ff46b12149fd2a2616e
SHA512 090d4e9092b7fe00180164b6f84b4bd1d1a1e12dc8fea042eaa0e75cc08bb9994c91c3853bedec390208db4ef2e3447cd9be20d7dc20c14e6deb52a141d554cf

memory/2816-1364-0x000007FEF64C0000-0x000007FEF6B85000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-17 23:02

Reported

2024-08-17 23:20

Platform

win10v2004-20240802-en

Max time kernel

1050s

Max time network

1012s

Command Line

"C:\Users\Admin\AppData\Local\Temp\PepperX.exe"

Signatures

Enumerates VirtualBox DLL files

Description Indicator Process Target
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\Pepper X\PepperXLoaderV1.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\Pepper X\PepperXLoaderV1.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\Pepper X\PepperXLoaderV1.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\Pepper X\PepperXLoaderV1.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Executor = "C:\\Users\\Admin\\Pepper X\\PepperXLoaderV1.exe" C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A raw.githubusercontent.com N/A N/A

Browser Information Discovery

discovery

Checks SCSI registry key(s)

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName C:\Windows\system32\taskmgr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 C:\Windows\system32\taskmgr.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A C:\Windows\system32\taskmgr.exe N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Modifies registry class

Description Indicator Process Target
Set value (data) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 C:\Windows\system32\taskmgr.exe N/A
Set value (data) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0100000000000000ffffffff C:\Windows\system32\taskmgr.exe N/A
Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-523280732-2327480845-3730041215-1000\{6D48C4CC-1109-4CC0-9C84-CCE9DB63F019} C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings C:\Windows\system32\taskmgr.exe N/A
Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell C:\Windows\system32\taskmgr.exe N/A
Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU C:\Windows\system32\taskmgr.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Users\Admin\Pepper X\PepperXLoaderV1.exe N/A
N/A N/A C:\Users\Admin\Pepper X\PepperXLoaderV1.exe N/A
N/A N/A C:\Users\Admin\Pepper X\PepperXLoaderV1.exe N/A
N/A N/A C:\Users\Admin\Pepper X\PepperXLoaderV1.exe N/A
N/A N/A C:\Users\Admin\Pepper X\PepperXLoaderV1.exe N/A
N/A N/A C:\Users\Admin\Pepper X\PepperXLoaderV1.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\Pepper X\PepperXLoaderV1.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Users\Admin\Pepper X\PepperXLoaderV1.exe N/A

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeCreateGlobalPrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Pepper X\PepperXLoaderV1.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Pepper X\PepperXLoaderV1.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\system32\taskmgr.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A
N/A N/A C:\Windows\system32\taskmgr.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Pepper X\PepperXLoaderV1.exe N/A
N/A N/A C:\Users\Admin\Pepper X\PepperXLoaderV1.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4140 wrote to memory of 2068 N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe C:\Users\Admin\AppData\Local\Temp\PepperX.exe
PID 4140 wrote to memory of 2068 N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe C:\Users\Admin\AppData\Local\Temp\PepperX.exe
PID 2068 wrote to memory of 1328 N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2068 wrote to memory of 1328 N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2068 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe C:\Windows\system32\cmd.exe
PID 2068 wrote to memory of 2368 N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe C:\Windows\system32\cmd.exe
PID 2368 wrote to memory of 2208 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 2368 wrote to memory of 2208 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 2368 wrote to memory of 5056 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\Pepper X\PepperXLoaderV1.exe
PID 2368 wrote to memory of 5056 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\Pepper X\PepperXLoaderV1.exe
PID 2368 wrote to memory of 2800 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 2368 wrote to memory of 2800 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 5056 wrote to memory of 772 N/A C:\Users\Admin\Pepper X\PepperXLoaderV1.exe C:\Users\Admin\Pepper X\PepperXLoaderV1.exe
PID 5056 wrote to memory of 772 N/A C:\Users\Admin\Pepper X\PepperXLoaderV1.exe C:\Users\Admin\Pepper X\PepperXLoaderV1.exe
PID 772 wrote to memory of 116 N/A C:\Users\Admin\Pepper X\PepperXLoaderV1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 772 wrote to memory of 116 N/A C:\Users\Admin\Pepper X\PepperXLoaderV1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1360 wrote to memory of 3892 N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe C:\Users\Admin\AppData\Local\Temp\PepperX.exe
PID 1360 wrote to memory of 3892 N/A C:\Users\Admin\AppData\Local\Temp\PepperX.exe C:\Users\Admin\AppData\Local\Temp\PepperX.exe
PID 2232 wrote to memory of 5980 N/A C:\Users\Admin\Pepper X\PepperXLoaderV1.exe C:\Users\Admin\Pepper X\PepperXLoaderV1.exe
PID 2232 wrote to memory of 5980 N/A C:\Users\Admin\Pepper X\PepperXLoaderV1.exe C:\Users\Admin\Pepper X\PepperXLoaderV1.exe
PID 5980 wrote to memory of 6112 N/A C:\Users\Admin\Pepper X\PepperXLoaderV1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5980 wrote to memory of 6112 N/A C:\Users\Admin\Pepper X\PepperXLoaderV1.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2460 wrote to memory of 5156 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5156 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PID 2460 wrote to memory of 5160 N/A C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\PepperX.exe

"C:\Users\Admin\AppData\Local\Temp\PepperX.exe"

C:\Users\Admin\AppData\Local\Temp\PepperX.exe

"C:\Users\Admin\AppData\Local\Temp\PepperX.exe"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x4ec 0x2ec

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Pepper X\""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Pepper X\activate.bat""

C:\Windows\system32\attrib.exe

attrib +s +h .

C:\Users\Admin\Pepper X\PepperXLoaderV1.exe

"PepperXLoaderV1.exe"

C:\Windows\system32\taskkill.exe

taskkill /f /im "PepperX.exe"

C:\Users\Admin\Pepper X\PepperXLoaderV1.exe

"PepperXLoaderV1.exe"

C:\Windows\system32\taskmgr.exe

"C:\Windows\system32\taskmgr.exe" /4

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Pepper X\""

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

C:\Users\Admin\AppData\Local\Temp\PepperX.exe

"C:\Users\Admin\AppData\Local\Temp\PepperX.exe"

C:\Users\Admin\AppData\Local\Temp\PepperX.exe

"C:\Users\Admin\AppData\Local\Temp\PepperX.exe"

C:\Users\Admin\Pepper X\PepperXLoaderV1.exe

"C:\Users\Admin\Pepper X\PepperXLoaderV1.exe"

C:\Users\Admin\Pepper X\PepperXLoaderV1.exe

"C:\Users\Admin\Pepper X\PepperXLoaderV1.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Pepper X\""

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ffb68fd46f8,0x7ffb68fd4708,0x7ffb68fd4718

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1916 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:3

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:8

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:1

C:\Windows\System32\CompPkgSrv.exe

C:\Windows\System32\CompPkgSrv.exe -Embedding

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5236 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3652 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3620 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3544 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3544 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=5892 /prefetch:8

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1824 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=21 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3088 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6108 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6936 /prefetch:2

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2720 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3624 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=27 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5800 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=28 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=29 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=30 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7056 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=31 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=212 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=32 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6816 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=34 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2332 /prefetch:1

C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe

"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1920,9485781514316219785,17247353184355006107,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6428 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 73.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 68.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 228.249.119.40.in-addr.arpa udp
N/A 127.0.0.1:50758 tcp
US 8.8.8.8:53 discord.com udp
US 162.159.137.232:443 discord.com tcp
US 162.159.136.232:443 discord.com tcp
US 162.159.135.232:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.138.232:443 discord.com tcp
US 8.8.8.8:53 232.137.159.162.in-addr.arpa udp
US 8.8.8.8:53 232.135.159.162.in-addr.arpa udp
US 8.8.8.8:53 233.128.159.162.in-addr.arpa udp
US 8.8.8.8:53 232.138.159.162.in-addr.arpa udp
US 8.8.8.8:53 232.136.159.162.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
N/A 127.0.0.1:54937 tcp
US 162.159.137.232:443 discord.com tcp
US 162.159.136.232:443 discord.com tcp
US 162.159.135.232:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.138.232:443 discord.com tcp
US 52.111.229.43:443 tcp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
GB 95.101.143.202:443 www.bing.com tcp
US 8.8.8.8:53 202.143.101.95.in-addr.arpa udp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 r.bing.com udp
US 8.8.8.8:53 th.bing.com udp
GB 95.101.143.202:443 th.bing.com tcp
GB 95.101.143.202:443 th.bing.com tcp
GB 88.221.135.42:443 th.bing.com tcp
GB 88.221.135.42:443 th.bing.com tcp
US 8.8.8.8:53 bing.com udp
US 13.107.21.200:443 bing.com tcp
US 8.8.8.8:53 42.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 login.microsoftonline.com udp
NL 40.126.32.133:443 login.microsoftonline.com tcp
US 8.8.8.8:53 200.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 github.com udp
GB 20.26.156.215:443 github.com tcp
GB 20.26.156.215:443 github.com tcp
US 8.8.8.8:53 services.bingapis.com udp
US 13.107.5.80:443 services.bingapis.com tcp
US 8.8.8.8:53 github.githubassets.com udp
US 8.8.8.8:53 avatars.githubusercontent.com udp
US 185.199.111.154:443 github.githubassets.com tcp
US 185.199.110.133:443 avatars.githubusercontent.com tcp
US 8.8.8.8:53 github-cloud.s3.amazonaws.com udp
US 8.8.8.8:53 user-images.githubusercontent.com udp
US 8.8.8.8:53 215.156.26.20.in-addr.arpa udp
US 8.8.8.8:53 80.5.107.13.in-addr.arpa udp
US 8.8.8.8:53 154.111.199.185.in-addr.arpa udp
US 8.8.8.8:53 133.110.199.185.in-addr.arpa udp
US 8.8.8.8:53 raw.githubusercontent.com udp
US 8.8.8.8:53 collector.github.com udp
US 140.82.112.22:443 collector.github.com tcp
US 140.82.112.22:443 collector.github.com tcp
US 185.199.111.154:443 github.githubassets.com tcp
US 8.8.8.8:53 api.github.com udp
GB 20.26.156.210:443 api.github.com tcp
US 8.8.8.8:53 210.156.26.20.in-addr.arpa udp
US 8.8.8.8:53 22.112.82.140.in-addr.arpa udp
US 8.8.8.8:53 72.32.126.40.in-addr.arpa udp
US 172.64.154.167:443 www2.bing.com tcp
US 172.64.154.167:443 www2.bing.com tcp
US 8.8.8.8:53 167.154.64.172.in-addr.arpa udp
US 8.8.8.8:53 objects.githubusercontent.com udp
US 8.8.8.8:53 88.65.42.20.in-addr.arpa udp
US 8.8.8.8:53 collector.github.com udp
US 140.82.114.22:443 collector.github.com tcp
US 8.8.8.8:53 22.114.82.140.in-addr.arpa udp
GB 88.221.135.33:443 www.bing.com tcp
US 8.8.8.8:53 33.135.221.88.in-addr.arpa udp
US 8.8.8.8:53 r.bing.com udp
US 8.8.8.8:53 th.bing.com udp
GB 95.101.143.201:443 th.bing.com tcp
GB 95.101.143.201:443 th.bing.com tcp
GB 88.221.135.42:443 th.bing.com tcp
GB 88.221.135.42:443 th.bing.com tcp
US 8.8.8.8:53 201.143.101.95.in-addr.arpa udp
US 172.64.154.167:443 www2.bing.com tcp
US 172.64.154.167:443 www2.bing.com tcp
US 8.8.8.8:53 peppergeek.com udp
US 172.67.202.248:443 peppergeek.com tcp
US 172.67.202.248:443 peppergeek.com tcp
US 172.67.202.248:443 peppergeek.com tcp
US 8.8.8.8:53 248.202.67.172.in-addr.arpa udp
US 8.8.8.8:53 scripts.mediavine.com udp
US 8.8.8.8:53 peppergeek.ck.page udp
US 104.17.188.112:443 peppergeek.ck.page tcp
US 104.17.188.112:443 peppergeek.ck.page tcp
US 8.8.8.8:53 secure.gravatar.com udp
US 192.0.73.2:443 secure.gravatar.com tcp
US 104.17.188.112:443 peppergeek.ck.page tcp
US 8.8.8.8:53 168.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 2.73.0.192.in-addr.arpa udp
US 8.8.8.8:53 112.188.17.104.in-addr.arpa udp
US 151.101.65.181:443 scripts.mediavine.com tcp
US 8.8.8.8:53 f.convertkit.com udp
US 162.159.140.148:443 f.convertkit.com tcp
US 8.8.8.8:53 238.75.250.142.in-addr.arpa udp
US 8.8.8.8:53 181.65.101.151.in-addr.arpa udp
US 8.8.8.8:53 226.21.18.104.in-addr.arpa udp
US 162.159.140.148:443 f.convertkit.com tcp
US 8.8.8.8:53 148.140.159.162.in-addr.arpa udp
US 172.64.154.167:443 www2.bing.com tcp
US 172.64.154.167:443 www2.bing.com tcp
US 172.64.154.167:443 www2.bing.com tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 172.64.154.167:443 www2.bing.com tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 10.27.171.150.in-addr.arpa udp
GB 95.101.143.201:443 www.bing.com tcp
GB 95.101.143.201:443 www.bing.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI41402\setuptools\_vendor\importlib_metadata-8.0.0.dist-info\INSTALLER

MD5 365c9bfeb7d89244f2ce01c1de44cb85
SHA1 d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256 ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512 d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

C:\Users\Admin\AppData\Local\Temp\_MEI41402\setuptools\_vendor\jaraco.text-3.12.1.dist-info\LICENSE

MD5 141643e11c48898150daa83802dbc65f
SHA1 0445ed0f69910eeaee036f09a39a13c6e1f37e12
SHA256 86da0f01aeae46348a3c3d465195dc1ceccde79f79e87769a64b8da04b2a4741
SHA512 ef62311602b466397baf0b23caca66114f8838f9e78e1b067787ceb709d09e0530e85a47bbcd4c5a0905b74fdb30df0cc640910c6cc2e67886e5b18794a3583f

C:\Users\Admin\AppData\Local\Temp\_MEI41402\setuptools\_vendor\jaraco.text-3.12.1.dist-info\WHEEL

MD5 43136dde7dd276932f6197bb6d676ef4
SHA1 6b13c105452c519ea0b65ac1a975bd5e19c50122
SHA256 189eedfe4581172c1b6a02b97a8f48a14c0b5baa3239e4ca990fbd8871553714
SHA512 e7712ba7d36deb083ebcc3b641ad3e7d19fb071ee64ae3a35ad6a50ee882b20cd2e60ca1319199df12584fe311a6266ec74f96a3fb67e59f90c7b5909668aee1

C:\Users\Admin\AppData\Local\Temp\_MEI41402\python312.dll

MD5 36e9be7e881d1dc29295bf7599490241
SHA1 5b6746aedac80f0e6f16fc88136bcdcbd64b3c65
SHA256 ebef43e92267a17f44876c702c914aafa46b997b63223ff46b12149fd2a2616e
SHA512 090d4e9092b7fe00180164b6f84b4bd1d1a1e12dc8fea042eaa0e75cc08bb9994c91c3853bedec390208db4ef2e3447cd9be20d7dc20c14e6deb52a141d554cf

C:\Users\Admin\AppData\Local\Temp\_MEI41402\VCRUNTIME140.dll

MD5 be8dbe2dc77ebe7f88f910c61aec691a
SHA1 a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA256 4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA512 0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

memory/2068-1366-0x00007FFB512B0000-0x00007FFB51975000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI41402\_ctypes.pyd

MD5 1a546aaa7d44f48daef4750a679fe22f
SHA1 0aaa6657b15c79b3713229e61aec5d0e16e5b404
SHA256 b1ed56b8aab1dc0e4021bb08b53ac82fa9bf0c56f171287c55241617dd90bc5b
SHA512 338b6210bbde57ac6bbd032f8d65b90fe43d1509c74d138766a50490ee0ff93b5c94ec29fb8b8575f602304a342aa195dfff7b9bc22bb20e78545521ce0cd2e9

C:\Users\Admin\AppData\Local\Temp\_MEI41402\python3.DLL

MD5 8dbe9bbf7118f4862e02cd2aaf43f1ab
SHA1 935bc8c5cea4502d0facf0c49c5f2b9c138608ed
SHA256 29f173e0147390a99f541ba0c0231fdd7dfbca84d0e2e561ef352bf1ec72f5db
SHA512 938f8387dcc356012ac4a952d371664700b110f7111fcc24f5df7d79791ae95bad0dbaf77d2d6c86c820bfd48a6bdbe8858b7e7ae1a77df88e596556c7135ed4

C:\Users\Admin\AppData\Local\Temp\_MEI41402\libffi-8.dll

MD5 013a0b2653aa0eb6075419217a1ed6bd
SHA1 1b58ff8e160b29a43397499801cf8ab0344371e7
SHA256 e9d8eb01bb9b02ce3859ba4527938a71b4668f98897d46f29e94b27014036523
SHA512 0bd13fa1d55133ee2a96387e0756f48133987bacd99d1f58bab3be7bffdf868092060c17ab792dcfbb4680f984f40d3f7cc24abdd657b756496aa8884b8f6099

C:\Users\Admin\AppData\Local\Temp\_MEI41402\_lzma.pyd

MD5 385a812072bc56d47823360908c2e5ca
SHA1 e8f758dfbd6ed8a82d614343116d9e9c164ce021
SHA256 4943f6912c4ddd1f6d11fa6ea7f619bf852569efe013558105e7a26518d466fd
SHA512 adc6ebda1eb2a51d5bb109c0019150827a3606399f450c250309fce50ae81a820a5a813657e8f4fa6eb7ccc7cb2a5f332aa23db6f12baec156ffc3dd1a32879d

memory/2068-1380-0x00007FFB61A30000-0x00007FFB61A4A000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI41402\_hashlib.pyd

MD5 c2ac87c77fb85f1c09164b9b854563b2
SHA1 f1bf0ef87442db135b19a3f21d37285994315c81
SHA256 e8927da7aa0909244eff9b82aec82f2cd597fcab41ba60fd8a08f3cb376dc888
SHA512 a40068dbb8a31c443bd0d7f037bb77561782b07e6f49ef8eeefb2cdc35dc58ab0f3b80194f0da26eb42b525ca845891e0aa05a3b4a907622c30cf66583381cef

memory/2068-1423-0x00007FFB619E0000-0x00007FFB619F4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI41402\libcrypto-3.dll

MD5 8fed6a2bbb718bb44240a84662c79b53
SHA1 2cd169a573922b3a0e35d0f9f252b55638a16bca
SHA256 f8de79a5dd7eeb4b2a053315ab4c719cd48fe90b0533949f94b6a291e6bc70fd
SHA512 87787593e6a7d0556a4d05f07a276ffdbef551802eb2e4b07104362cb5af0b32bffd911fd9237799e10e0c8685e9e7a7345c3bce2ad966843c269b4c9bd83e03

C:\Users\Admin\AppData\Local\Temp\_MEI41402\libssl-3.dll

MD5 37c7f14cd439a0c40d496421343f96d5
SHA1 1b6d68159e566f3011087befdcf64f6ee176085c
SHA256 b9c8276a3122cacba65cfa78217fef8a6d4f0204548fcacce66018cb91cb1b2a
SHA512 f446fd4bd351d391006d82198f7f679718a6e17f14ca5400ba23886275ed5363739bfd5bc01ca07cb2af19668dd8ab0b403bcae139d81a245db2b775770953ea

C:\Users\Admin\AppData\Local\Temp\_MEI41402\charset_normalizer\md.cp312-win_amd64.pyd

MD5 191c247b7e0543cc769718232ead35da
SHA1 e3f0be22199ff1f5cf131a12c1c7a58805f2fff5
SHA256 3d393309cbc6e88919c4fd472394d7c31f26f1709dffadd1c7e8895097e6cab3
SHA512 ad0316e9430308a05672e28050bf5c23bd2f7d81e7dc97e7926cd54a9fc0ba78ba904dee87b04688e7d0377ba69892a6cea7ab9f972c08e8d9da1d7c13693f97

C:\Users\Admin\AppData\Local\Temp\_MEI41402\_queue.pyd

MD5 ff5aa080771afaf13ba28c249a2a7f31
SHA1 18463bba2ac965e51a85724f7cbae09f145d8e75
SHA256 088bcabbf20ba558b891c949b29204fc5cad9ada37794a4d81608fade2f68e4d
SHA512 9d5bc7806717ce8a04078181433a8a29e0a869ba4310030d16e52f0ef33f8e7374ea571ca764dafc9288e65c672cee11d7a0a66a8ca852ba5d9490330651bd01

C:\Users\Admin\AppData\Local\Temp\_MEI41402\_ssl.pyd

MD5 b09de65cadc4718032551525b3b4ee84
SHA1 c685ab6985bd8ba5e85a1575baa57501e9181329
SHA256 d85b9564b554d2daae8ab96e6d08e95c23e4d819e943d76727e21972aae1c5d1
SHA512 2f70b8c50d09952163f63e8e84f74b7a91f42f58bec11d20dc663e1b04f62c0ac5ddb6ddd497723fc26c2cf19684d4eea6eb0878bf7f22863582a774cc09de06

C:\Users\Admin\AppData\Local\Temp\_MEI41402\select.pyd

MD5 7707f61fa9f5e225de74d55cb1021511
SHA1 73ce7161eaaf9e81233f4f034bbbb5ea9c8e438a
SHA256 ac639851261f6fe6951481a9fc1ea64e1e97c92910407296c3dbc2d888384944
SHA512 5654ffd703a0fad8f953cd59679f6a053ab42e0207a38837a722e3dba65cadbb1fd2a91b344f8596ba7470eb822759b0f6b51a1543b1810c4089444fe3127105

memory/2068-1438-0x00007FFB61130000-0x00007FFB61157000-memory.dmp

memory/2068-1437-0x00007FFB61930000-0x00007FFB6193B000-memory.dmp

memory/2068-1436-0x00007FFB61940000-0x00007FFB6194D000-memory.dmp

memory/2068-1435-0x00007FFB52060000-0x00007FFB5212D000-memory.dmp

memory/2068-1434-0x00007FFB5D4F0000-0x00007FFB5D523000-memory.dmp

memory/2068-1433-0x00007FFB619D0000-0x00007FFB619DD000-memory.dmp

memory/2068-1432-0x00007FFB50D80000-0x00007FFB512A9000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI41402\_socket.pyd

MD5 794b03a9d66e2c20b3c5b6da1e491f03
SHA1 11371fd5e491e399386ee9430c1c7c1f087d8034
SHA256 9557520c96d984e13500d2a673b342fde071502a418e9f606c6c9bdd83723f80
SHA512 c00923b0fdbb8a144a2d2d1a9fa6ec057262082a98de84a088d7cf2fd8c20440f8a8b40eb2c54d6b98cf3f9ae7c07f61aa6cf8c68e208eeb833bc7766c877cf9

memory/2068-1421-0x00007FFB61A00000-0x00007FFB61A2D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI41402\_wmi.pyd

MD5 cedc59ac09061537eb289f769bad7b9e
SHA1 5ae74eab2e9d076e2659da9f1295274ad2abd0cb
SHA256 48570c1739f9ae4880a73ef8fac1e422b4edde95de68b87bb31eac0256928fa0
SHA512 314daab6bb5fdeddb325f9834b8f87027c711371ff1463b74f6ab0ecb92cc5db8934c4775eb0dc7df46dbda5145e00f93cb667aa6e693ae35f4d3c3cf2b52762

C:\Users\Admin\AppData\Local\Temp\_MEI41402\_uuid.pyd

MD5 8f5402bb6aac9c4ff9b4ce5ac3f0f147
SHA1 87207e916d0b01047b311d78649763d6e001c773
SHA256 793e44c75e7d746af2bb5176e46c454225f07cb27b1747f1b83d1748d81ad9ac
SHA512 65fdef32aeba850aa818a8c8bf794100725a9831b5242350e6c04d0bca075762e1b650f19c437a17b150e9fca6ad344ec4141a041fa12b5a91652361053c7e81

C:\Users\Admin\AppData\Local\Temp\_MEI41402\_tkinter.pyd

MD5 81ccc49a344eb0d332f0b1da9c9f3ddb
SHA1 59a8e41a03eec92f65c44e288e32497aebbd8bc6
SHA256 7f1acba0744ebbd10d67d6cc4ee1a4e8a67ff6e53c7d663e0a5ef0bc7f0bb90c
SHA512 c66d015130e518ef05d7300dff8ad69ec8290a38ffbb5155de539d0b800091f67be7787905ebe7c46ba04d4160aec7825e05fa14e58a517c44083d3f15ce5bb5

C:\Users\Admin\AppData\Local\Temp\_MEI41402\_sqlite3.pyd

MD5 6a04a1dfa71c5fc80e6561feb2ecf77d
SHA1 ad8fa558ea3e10344e48dd94072464d7b6feb908
SHA256 7f8ae2ae9acb14285e0bab70d817b3a5ab9ff531484fd18bc2e84ca19c66bb01
SHA512 fc95c87f29f6c54a64a26091b03c8ab7328d81298a7f12afbc38d8e7c05c5a0d4d4d7b33ef2c6d94d921772e5a85d2419e5b3356cf25cbdb9fa4a65050b05aeb

C:\Users\Admin\AppData\Local\Temp\_MEI41402\_overlapped.pyd

MD5 4be51674f1bc4bf44fa85580069b596a
SHA1 83c9a8f117319286dbd60fa5be3e0d5137b6b08e
SHA256 39768fc9e5b5c7c553d8b67d6529a42835e3dea0bb85dc051ed56d76eaa37d6e
SHA512 64e8dfe616fdd785f03657827b156686cafa26b41a8baaa0a78108aeea11dc97d4cc46012bec6140685f476c5f299a928ac26353f246918fcb754558d08c3136

C:\Users\Admin\AppData\Local\Temp\_MEI41402\_multiprocessing.pyd

MD5 9ff35affc5bb5884357a1638e037550c
SHA1 0c23f98b11a609f19de64ae84e8bf457a00ecf20
SHA256 fde0d143290783e5c21cb91b9edd2f51513f25c365b70b54857d0d9f50947ed7
SHA512 d4ebaca2f9b17ffda750f5cd1e2c6627db38884cd7f6e52ac0496a1e64489b61df56f0344ccb7fa29c547a464315c573314d6038048cb53b46ff6ec3d75495df

C:\Users\Admin\AppData\Local\Temp\_MEI41402\_elementtree.pyd

MD5 7fa4283e02e5df8440e5bab00734daec
SHA1 d65be448b03419e12358479a6d9f0204e78f6c7d
SHA256 9bef538ecf64b57bdf3b3276708cc05930d402891618b46e73a5c31490f22469
SHA512 c37cbea70416798db586c5cac7174b72ab47c90b2740b4b2c49cd875455f2bf5b733f700cf7610b69e7f9de9454860266df6966bfb734a552e1c8f4a2515197b

C:\Users\Admin\AppData\Local\Temp\_MEI41402\_decimal.pyd

MD5 0cd50be9ed60afdfaad0497854db6d0d
SHA1 b2514e58e5a98ca3c4e70e035810ecd06cb73b1f
SHA256 1d68f9a2c700565ff3ae3fc3956cbb8ab4fcf4fdfa7cbfb5a98aa350226505a2
SHA512 2896d5704586491105c56ecd34881601f0a65329e8fff9a8082afd406a34d3ebb74f670766f61f5fa70b2e7388d9e2a71625c9d0023af26fb6f91fb36f5d5de6

C:\Users\Admin\AppData\Local\Temp\_MEI41402\_cffi_backend.cp312-win_amd64.pyd

MD5 61ce9c98f26db0dd41616a95af93c7df
SHA1 7e6a8c41276859748d847e0f9cf81374a1b29d0a
SHA256 9b8893ee9fef73c1d8b125af11150c9988a4ff275eb01ff86edbfbf022e18936
SHA512 baedde5d10293ebb09291ed22ab8669866647239ffc368014d7bd604f5eeb5b1e4645c47bdad749b4faeb2dbb0ff2f89b3e9bcc294ff0b13b3f5f2dbaf6ff9d8

C:\Users\Admin\AppData\Local\Temp\_MEI41402\_asyncio.pyd

MD5 b7b1cab9edce355c146141010994a93d
SHA1 5d55a40e2adaa9323275828f5053e6ec5baaab0c
SHA256 dacaab596eff05ba6b2aadce45d0d59648b73cf25d060dec98695406637caf2d
SHA512 e4da70890c1506c6a47bbce5efbdb1149b5ffd1ad0f635750ee8f426bfdba2850465499b27197d1fea718192fc531cc015dc5197bfaca84c15d1f1352b9ad36c

C:\Users\Admin\AppData\Local\Temp\_MEI41402\zlib1.dll

MD5 ee06185c239216ad4c70f74e7c011aa6
SHA1 40e66b92ff38c9b1216511d5b1119fe9da6c2703
SHA256 0391066f3e6385a9c0fe7218c38f7bd0b3e0da0f15a98ebb07f1ac38d6175466
SHA512 baae562a53d491e19dbf7ee2cff4c13d42de6833036bfdaed9ed441bcbf004b68e4088bd453b7413d60faaf1b334aee71241ba468437d49050b8ccfa9232425d

C:\Users\Admin\AppData\Local\Temp\_MEI41402\VCRUNTIME140_1.dll

MD5 f8dfa78045620cf8a732e67d1b1eb53d
SHA1 ff9a604d8c99405bfdbbf4295825d3fcbc792704
SHA256 a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5
SHA512 ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371

C:\Users\Admin\AppData\Local\Temp\_MEI41402\unicodedata.pyd

MD5 7e6ccb19d4f019e0d8dcda1d1b51f481
SHA1 b53539c817d6b53f279dc2fbebc210331fc35430
SHA256 924def015aa801d088d83380cf02befb38d0aa69bd541f413c07cf40c59b7bde
SHA512 27a352da9a883fb5992fde7549d5b38cdf5a271a11426d4a13222dbe0c7219818dac57e65a07ba1b1d6bc49bc03ad194b16200e033194fed04f694dc9377f94e

C:\Users\Admin\AppData\Local\Temp\_MEI41402\tk86t.dll

MD5 c33191c40eafd44532eb2d68fa670765
SHA1 a44b786d8c716f574d04dfcb0e1c729b68348d60
SHA256 ff93ffd200748ad93077a7eb36785e250d3defd283e0dd8182ac80c24c9ea3c6
SHA512 a2096685c1516c936c2a2b894c1ebd74e7100aa83710f412b833eb6a4c33cd98f5bf06207c36c6209eafc0084df36e81febf4aaf1e46438fb7985ea9568cd84f

C:\Users\Admin\AppData\Local\Temp\_MEI41402\tcl86t.dll

MD5 c0e0e8b121c5b9ccc3f5102332bacff1
SHA1 2a16f8c6c5143cb70bf249f868d0b71a7b6a2116
SHA256 64aadb6388329d7d3387718fdad5d7591b7b091981c60865a44a4f7ec57c2705
SHA512 290d538f7906ecf71302ffa65335bc8f9509a25d7e0ea73a9e955e833db539b7810818b663f82aa0cc4703e6f283e3dadc2e3630dd83a204e21dc064c2ebdff1

C:\Users\Admin\AppData\Local\Temp\_MEI41402\sqlite3.dll

MD5 50d021c2c62240e20f6115929dc8222b
SHA1 1fcb9f659de371d476436b77405c92e8ca0be2cb
SHA256 326486760609708710de1ff95e6329958caa2bbe45b57e41bb3fb242f3c1207c
SHA512 7cf3e2c98aa3d73789ad2ebb96fbab1d54f65972847ad971c77ae7cae7ce86009f0c9100d23f564a45981fa117a43d5746f239afdeafb7b195b7761c5acab19c

C:\Users\Admin\AppData\Local\Temp\_MEI41402\SDL2_ttf.dll

MD5 eb0ce62f775f8bd6209bde245a8d0b93
SHA1 5a5d039e0c2a9d763bb65082e09f64c8f3696a71
SHA256 74591aab94bb87fc9a2c45264930439bbc0d1525bf2571025cd9804e5a1cd11a
SHA512 34993240f14a89179ac95c461353b102ea74e4180f52c206250bb42c4c8427a019ea804b09a6903674ac00ab2a3c4c686a86334e483110e79733696aa17f4eb6

C:\Users\Admin\AppData\Local\Temp\_MEI41402\SDL2_mixer.dll

MD5 b7b45f61e3bb00ccd4ca92b2a003e3a3
SHA1 5018a7c95dc6d01ba6e3a7e77dd26c2c74fd69bc
SHA256 1327f84e3509f3ccefeef1c12578faf04e9921c145233687710253bf903ba095
SHA512 d3449019824124f3edbda57b3b578713e9c9915e173d31566cd8e4d18f307ac0f710250fe6a906dd53e748db14bfa76ec1b58a6aef7d074c913679a47c5fdbe7

C:\Users\Admin\AppData\Local\Temp\_MEI41402\SDL2_image.dll

MD5 25e2a737dcda9b99666da75e945227ea
SHA1 d38e086a6a0bacbce095db79411c50739f3acea4
SHA256 22b27380d4f1f217f0e5d5c767e5c244256386cd9d87f8ddf303baaf9239fc4c
SHA512 63de988387047c17fd028a894465286fd8f6f8bd3a1321b104c0ceb5473e3e0b923153b4999143efbdd28684329a33a5b468e43f25214037f6cddd4d1884adb8

C:\Users\Admin\AppData\Local\Temp\_MEI41402\SDL2.dll

MD5 ec3c1d17b379968a4890be9eaab73548
SHA1 7dbc6acee3b9860b46c0290a9b94a344d1927578
SHA256 aaa11e97c3621ed680ff2388b91acb394173b96a6e8ffbf3b656079cd00a0b9f
SHA512 06a7880ec80174b48156acd6614ab42fb4422cd89c62d11a7723a3c872f213bfc6c1006df8bdc918bb79009943d2b65c6a5c5e89ad824d1a940ddd41b88a1edb

C:\Users\Admin\AppData\Local\Temp\_MEI41402\pyexpat.pyd

MD5 71a72cd213e6756a9915afb34f7b8013
SHA1 922e306c60c34137d9428a8fbd98284afebad12f
SHA256 80f1db58145dffd83934fa92f858aa9e42cac00e3b1ff6045aeb33a4dcf77cee
SHA512 006285b75742bac90a94370016f5796bfbf1a1fc2de8b5c888f738c4667f32ce95f102b37da55662fcecbe3720765aec022afa89eec16e1f1e10b8069b621aa6

C:\Users\Admin\AppData\Local\Temp\_MEI41402\portmidi.dll

MD5 0df0699727e9d2179f7fd85a61c58bdf
SHA1 82397ee85472c355725955257c0da207fa19bf59
SHA256 97a53e8de3f1b2512f0295b5de98fa7a23023a0e4c4008ae534acdba54110c61
SHA512 196e41a34a60de83cb24caa5fc95820fd36371719487350bc2768354edf39eeb6c7860ff3fd9ecf570abb4288523d7ab934e86e85202b9753b135d07180678cd

C:\Users\Admin\AppData\Local\Temp\_MEI41402\libwebp-7.dll

MD5 b0dd211ec05b441767ea7f65a6f87235
SHA1 280f45a676c40bd85ed5541ceb4bafc94d7895f3
SHA256 fc06b8f92e86b848a17eaf7ed93464f54ed1f129a869868a74a75105ff8ce56e
SHA512 eaeb83e46c8ca261e79b3432ec2199f163c44f180eb483d66a71ad530ba488eb4cdbd911633e34696a4ccc035e238bc250a8247f318aa2f0cd9759cad4f90fff

C:\Users\Admin\AppData\Local\Temp\_MEI41402\libtiff-5.dll

MD5 ebad1fa14342d14a6b30e01ebc6d23c1
SHA1 9c4718e98e90f176c57648fa4ed5476f438b80a7
SHA256 4f50820827ac76042752809479c357063fe5653188654a6ba4df639da2fbf3ca
SHA512 91872eaa1f3f45232ab2d753585e650ded24c6cc8cc1d2a476fa98a61210177bd83570c52594b5ad562fc27cb76e034122f16a922c6910e4ed486da1d3c45c24

C:\Users\Admin\AppData\Local\Temp\_MEI41402\libpng16-16.dll

MD5 55009dd953f500022c102cfb3f6a8a6c
SHA1 07af9f4d456ddf86a51da1e4e4c5b54b0cf06ddb
SHA256 20391787cba331cfbe32fbf22f328a0fd48924e944e80de20ba32886bf4b6fd2
SHA512 4423d3ec8fef29782f3d4a21feeac9ba24c9c765d770b2920d47b4fb847a96ff5c793b20373833b4ff8bc3d8fa422159c64beffb78ce5768ed22742740a8c6c6

C:\Users\Admin\AppData\Local\Temp\_MEI41402\libopusfile-0.dll

MD5 2d5274bea7ef82f6158716d392b1be52
SHA1 ce2ff6e211450352eec7417a195b74fbd736eb24
SHA256 6dea07c27c0cc5763347357e10c3b17af318268f0f17c7b165325ce524a0e8d5
SHA512 9973d68b23396b3aa09d2079d18f2c463e807c9c1fdf4b1a5f29d561e8d5e62153e0c7be23b63975ad179b9599ff6b0cf08ebdbe843d194483e7ec3e7aeb232a

C:\Users\Admin\AppData\Local\Temp\_MEI41402\libopus-0.x64.dll

MD5 e56f1b8c782d39fd19b5c9ade735b51b
SHA1 3d1dc7e70a655ba9058958a17efabe76953a00b4
SHA256 fa8715dd0df84fdedbe4aa17763b2ab0db8941fa33421b6d42e25e59c4ae8732
SHA512 b7702e48b20a8991a5c537f5ba22834de8bb4ba55862b75024eace299263963b953606ee29e64d68b438bb0904273c4c20e71f22ccef3f93552c36fb2d1b2c46

C:\Users\Admin\AppData\Local\Temp\_MEI41402\libopus-0.dll

MD5 3fb9d9e8daa2326aad43a5fc5ddab689
SHA1 55523c665414233863356d14452146a760747165
SHA256 fd8de9169ccf53c5968eec0c90e9ff3a66fb451a5bf063868f3e82007106b491
SHA512 f263ea6e0fab84a65fe3a9b6c0fe860919eee828c84b888a5aa52dea540434248d1e810a883a2aff273cd9f22c607db966dd8776e965be6d2cfe1b50a1af1f57

C:\Users\Admin\AppData\Local\Temp\_MEI41402\libogg-0.dll

MD5 0d65168162287df89af79bb9be79f65b
SHA1 3e5af700b8c3e1a558105284ecd21b73b765a6dc
SHA256 2ec2322aec756b795c2e614dab467ef02c3d67d527ad117f905b3ab0968ccf24
SHA512 69af81fd2293c31f456b3c78588bb6a372fe4a449244d74bfe5bfaa3134a0709a685725fa05055cfd261c51a96df4b7ebd8b9e143f0e9312c374e54392f8a2c2

C:\Users\Admin\AppData\Local\Temp\_MEI41402\libmodplug-1.dll

MD5 2bb2e7fa60884113f23dcb4fd266c4a6
SHA1 36bbd1e8f7ee1747c7007a3c297d429500183d73
SHA256 9319bf867ed6007f3c61da139c2ab8b74a4cb68bf56265a101e79396941f6d3b
SHA512 1ddd4b9b9238c1744e0a1fe403f136a1def8df94814b405e7b01dd871b3f22a2afe819a26e08752142f127c3efe4ebae8bfd1bd63563d5eb98b4644426f576b2

C:\Users\Admin\AppData\Local\Temp\_MEI41402\libjpeg-9.dll

MD5 c22b781bb21bffbea478b76ad6ed1a28
SHA1 66cc6495ba5e531b0fe22731875250c720262db1
SHA256 1eed2385030348c84bbdb75d41d64891be910c27fab8d20fc9e85485fcb569dd
SHA512 9b42cad4a715680a27cd79f466fd2913649b80657ff042528cba2946631387ed9fb027014d215e1baf05839509ca5915d533b91aa958ae0525dea6e2a869b9e4

C:\Users\Admin\AppData\Local\Temp\_MEI41402\freetype.dll

MD5 04a9825dc286549ee3fa29e2b06ca944
SHA1 5bed779bf591752bb7aa9428189ec7f3c1137461
SHA256 50249f68b4faf85e7cd8d1220b7626a86bc507af9ae400d08c8e365f9ab97cde
SHA512 0e937e4de6cbc9d40035b94c289c2798c77c44fc1dc7097201f9fab97c7ff9e56113c06c51693f09908283eda92945b36de67351f893d4e3162e67c078cff4ec

C:\Users\Admin\AppData\Local\Temp\_MEI41402\_bz2.pyd

MD5 075ae3a74a32bb5386c3524a19e3927e
SHA1 8d832da3344e5958358c24d4d31e51f6a8ddfd24
SHA256 d581bf9f92031f73ae75e21328597906db970714430e6dc44ce525cf04d5e77a
SHA512 455cbe95a369562e56bf76e2c287c52cc5327872151b1797ba3636196dc9231c6d73557d28ee1e3cf2d1c233edb61587cae41498f5d1d8b9cc9c0fdecfff3f1b

memory/2068-1377-0x00007FFB61A50000-0x00007FFB61A5F000-memory.dmp

memory/2068-1374-0x00007FFB61A60000-0x00007FFB61A85000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI41402\base_library.zip

MD5 763d1a751c5d47212fbf0caea63f46f5
SHA1 845eaa1046a47b5cf376b3dbefcf7497af25f180
SHA256 378a4b40f4fa4a8229c93e0afee819085251af03402ccefa3b469651e50e60b7
SHA512 bb356dd610e6035f4002671440ce96624addf9a89fd952a6419647a528a551a6ccd0eca0ee2eeb080d9aad683b5afc9415c721fa62c3bcddcb7f1923f59d9c45

memory/2068-1440-0x00007FFB61950000-0x00007FFB61969000-memory.dmp

memory/2068-1439-0x00007FFB51F40000-0x00007FFB5205A000-memory.dmp

memory/2068-1442-0x00007FFB61110000-0x00007FFB6111B000-memory.dmp

memory/2068-1441-0x00007FFB61920000-0x00007FFB6192F000-memory.dmp

memory/2068-1452-0x00007FFB61A60000-0x00007FFB61A85000-memory.dmp

memory/2068-1456-0x00007FFB50D80000-0x00007FFB512A9000-memory.dmp

memory/2068-1461-0x00007FFB52C60000-0x00007FFB52C72000-memory.dmp

memory/2068-1466-0x00007FFB619E0000-0x00007FFB619F4000-memory.dmp

memory/2068-1465-0x00007FFB52C40000-0x00007FFB52C54000-memory.dmp

memory/2068-1464-0x00007FFB52B70000-0x00007FFB52B92000-memory.dmp

memory/2068-1463-0x00007FFB58630000-0x00007FFB5863C000-memory.dmp

memory/2068-1462-0x00007FFB5A710000-0x00007FFB5A71C000-memory.dmp

memory/2068-1460-0x00007FFB585D0000-0x00007FFB585E6000-memory.dmp

memory/2068-1459-0x00007FFB585F0000-0x00007FFB585FC000-memory.dmp

memory/2068-1458-0x00007FFB58600000-0x00007FFB58612000-memory.dmp

memory/2068-1457-0x00007FFB58620000-0x00007FFB5862D000-memory.dmp

memory/2068-1455-0x00007FFB5CD90000-0x00007FFB5CD9B000-memory.dmp

memory/2068-1467-0x00007FFB5CDC0000-0x00007FFB5CDD7000-memory.dmp

memory/2068-1454-0x00007FFB5CDA0000-0x00007FFB5CDAB000-memory.dmp

memory/2068-1468-0x00007FFB52B50000-0x00007FFB52B69000-memory.dmp

memory/2068-1471-0x00007FFB50AB0000-0x00007FFB50AC1000-memory.dmp

memory/2068-1470-0x00007FFB50AD0000-0x00007FFB50B1D000-memory.dmp

memory/2068-1469-0x00007FFB61920000-0x00007FFB6192F000-memory.dmp

memory/2068-1453-0x00007FFB5CDB0000-0x00007FFB5CDBC000-memory.dmp

memory/2068-1451-0x00007FFB60E50000-0x00007FFB60E5C000-memory.dmp

memory/2068-1450-0x00007FFB5DE00000-0x00007FFB5DE0E000-memory.dmp

memory/2068-1449-0x00007FFB5DE10000-0x00007FFB5DE1C000-memory.dmp

memory/2068-1448-0x00007FFB5E070000-0x00007FFB5E07C000-memory.dmp

memory/2068-1447-0x00007FFB5E700000-0x00007FFB5E70B000-memory.dmp

memory/2068-1446-0x00007FFB60BF0000-0x00007FFB60BFC000-memory.dmp

memory/2068-1445-0x00007FFB60E40000-0x00007FFB60E4B000-memory.dmp

memory/2068-1444-0x00007FFB60E60000-0x00007FFB60E6B000-memory.dmp

memory/2068-1443-0x00007FFB512B0000-0x00007FFB51975000-memory.dmp

memory/2068-1472-0x00007FFB50A40000-0x00007FFB50A5E000-memory.dmp

memory/2068-1473-0x00007FFB509E0000-0x00007FFB50A3D000-memory.dmp

memory/2068-1474-0x00007FFB509A0000-0x00007FFB509D8000-memory.dmp

memory/2068-1475-0x00007FFB50970000-0x00007FFB50999000-memory.dmp

memory/2068-1477-0x00007FFB50940000-0x00007FFB5096E000-memory.dmp

memory/2068-1476-0x00007FFB52B70000-0x00007FFB52B92000-memory.dmp

memory/2068-1480-0x00007FFB50790000-0x00007FFB5090F000-memory.dmp

memory/2068-1479-0x00007FFB5CDC0000-0x00007FFB5CDD7000-memory.dmp

memory/2068-1478-0x00007FFB50910000-0x00007FFB50934000-memory.dmp

memory/2068-1481-0x00007FFB50770000-0x00007FFB50788000-memory.dmp

memory/2068-1485-0x00007FFB50740000-0x00007FFB5074C000-memory.dmp

memory/2068-1484-0x00007FFB50750000-0x00007FFB5075B000-memory.dmp

memory/2068-1483-0x00007FFB50760000-0x00007FFB5076B000-memory.dmp

memory/2068-1482-0x00007FFB50AD0000-0x00007FFB50B1D000-memory.dmp

memory/2068-1486-0x00007FFB50730000-0x00007FFB5073B000-memory.dmp

memory/2068-1488-0x00007FFB50720000-0x00007FFB5072C000-memory.dmp

memory/2068-1487-0x00007FFB509E0000-0x00007FFB50A3D000-memory.dmp

memory/2068-1490-0x00007FFB50710000-0x00007FFB5071B000-memory.dmp

memory/2068-1489-0x00007FFB509A0000-0x00007FFB509D8000-memory.dmp

memory/2068-1492-0x00007FFB50700000-0x00007FFB5070C000-memory.dmp

memory/2068-1493-0x00007FFB506F0000-0x00007FFB506FC000-memory.dmp

memory/2068-1496-0x00007FFB506D0000-0x00007FFB506DC000-memory.dmp

memory/2068-1501-0x00007FFB506A0000-0x00007FFB506AC000-memory.dmp

memory/2068-1503-0x00007FFB50680000-0x00007FFB5068D000-memory.dmp

memory/2068-1505-0x00007FFB50650000-0x00007FFB5065C000-memory.dmp

memory/2068-1504-0x00007FFB50660000-0x00007FFB50672000-memory.dmp

memory/2068-1502-0x00007FFB50690000-0x00007FFB5069C000-memory.dmp

memory/2068-1500-0x00007FFB506C0000-0x00007FFB506CB000-memory.dmp

memory/2068-1499-0x00007FFB506B0000-0x00007FFB506BB000-memory.dmp

memory/2068-1498-0x00007FFB50770000-0x00007FFB50788000-memory.dmp

memory/2068-1497-0x00007FFB50790000-0x00007FFB5090F000-memory.dmp

memory/2068-1495-0x00007FFB506E0000-0x00007FFB506EE000-memory.dmp

memory/2068-1494-0x00007FFB50910000-0x00007FFB50934000-memory.dmp

memory/2068-1491-0x00007FFB50970000-0x00007FFB50999000-memory.dmp

memory/2068-1506-0x00007FFB502C0000-0x00007FFB502F6000-memory.dmp

memory/2068-1507-0x00007FFB4FFE0000-0x00007FFB502C0000-memory.dmp

memory/2068-1508-0x00007FFB4DEE0000-0x00007FFB4FFD3000-memory.dmp

memory/2068-1510-0x00007FFB4DE90000-0x00007FFB4DEB1000-memory.dmp

memory/2068-1509-0x00007FFB4DEC0000-0x00007FFB4DED7000-memory.dmp

memory/2068-1512-0x00007FFB4DD90000-0x00007FFB4DE29000-memory.dmp

memory/2068-1511-0x00007FFB4DE30000-0x00007FFB4DE52000-memory.dmp

memory/2068-1514-0x00007FFB4DD20000-0x00007FFB4DD51000-memory.dmp

memory/2068-1513-0x00007FFB4DD60000-0x00007FFB4DD90000-memory.dmp

memory/2068-1516-0x00007FFB4DCB0000-0x00007FFB4DCCA000-memory.dmp

memory/2068-1515-0x00007FFB4DCD0000-0x00007FFB4DD11000-memory.dmp

memory/2068-1517-0x00007FFB4DEE0000-0x00007FFB4FFD3000-memory.dmp

memory/2068-1521-0x00007FFB4DC90000-0x00007FFB4DCA9000-memory.dmp

memory/2068-1520-0x00007FFB4D0B0000-0x00007FFB4D851000-memory.dmp

memory/2068-1519-0x00007FFB4D860000-0x00007FFB4DAA9000-memory.dmp

memory/2068-1518-0x00007FFB4DB90000-0x00007FFB4DC42000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_mpcbrjwy.eww.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2068-1587-0x00007FFB50AD0000-0x00007FFB50B1D000-memory.dmp

memory/2068-1584-0x00007FFB52B70000-0x00007FFB52B92000-memory.dmp

memory/2068-1558-0x00007FFB52060000-0x00007FFB5212D000-memory.dmp

memory/2068-1552-0x00007FFB61A00000-0x00007FFB61A2D000-memory.dmp

memory/2068-1550-0x00007FFB61A50000-0x00007FFB61A5F000-memory.dmp

memory/2068-1588-0x00007FFB50AB0000-0x00007FFB50AC1000-memory.dmp

memory/2068-1586-0x00007FFB52B50000-0x00007FFB52B69000-memory.dmp

memory/2068-1585-0x00007FFB5CDC0000-0x00007FFB5CDD7000-memory.dmp

memory/2068-1582-0x00007FFB52C60000-0x00007FFB52C72000-memory.dmp

memory/2068-1581-0x00007FFB585D0000-0x00007FFB585E6000-memory.dmp

memory/2068-1580-0x00007FFB585F0000-0x00007FFB585FC000-memory.dmp

memory/2068-1579-0x00007FFB58600000-0x00007FFB58612000-memory.dmp

memory/2068-1578-0x00007FFB58620000-0x00007FFB5862D000-memory.dmp

memory/2068-1577-0x00007FFB58630000-0x00007FFB5863C000-memory.dmp

memory/2068-1576-0x00007FFB5A710000-0x00007FFB5A71C000-memory.dmp

memory/2068-1575-0x00007FFB5CD90000-0x00007FFB5CD9B000-memory.dmp

memory/2068-1573-0x00007FFB5CDB0000-0x00007FFB5CDBC000-memory.dmp

memory/2068-1572-0x00007FFB5DE00000-0x00007FFB5DE0E000-memory.dmp

memory/2068-1571-0x00007FFB5DE10000-0x00007FFB5DE1C000-memory.dmp

memory/2068-1570-0x00007FFB5E070000-0x00007FFB5E07C000-memory.dmp

memory/2068-1569-0x00007FFB5E700000-0x00007FFB5E70B000-memory.dmp

memory/2068-1568-0x00007FFB60BF0000-0x00007FFB60BFC000-memory.dmp

memory/2068-1567-0x00007FFB60E40000-0x00007FFB60E4B000-memory.dmp

memory/2068-1565-0x00007FFB60E60000-0x00007FFB60E6B000-memory.dmp

memory/2068-1564-0x00007FFB61110000-0x00007FFB6111B000-memory.dmp

memory/2068-1563-0x00007FFB61920000-0x00007FFB6192F000-memory.dmp

memory/2068-1562-0x00007FFB51F40000-0x00007FFB5205A000-memory.dmp

memory/2068-1561-0x00007FFB61130000-0x00007FFB61157000-memory.dmp

memory/2068-1560-0x00007FFB61930000-0x00007FFB6193B000-memory.dmp

memory/2068-1559-0x00007FFB61940000-0x00007FFB6194D000-memory.dmp

memory/2068-1554-0x00007FFB50D80000-0x00007FFB512A9000-memory.dmp

memory/2068-1548-0x00007FFB512B0000-0x00007FFB51975000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI50562\setuptools\_vendor\importlib_resources-6.4.0.dist-info\LICENSE

MD5 3b83ef96387f14655fc854ddc3c6bd57
SHA1 2b8b815229aa8a61e483fb4ba0588b8b6c491890
SHA256 cfc7749b96f63bd31c3c42b5c471bf756814053e847c10f3eb003417bc523d30
SHA512 98f6b79b778f7b0a15415bd750c3a8a097d650511cb4ec8115188e115c47053fe700f578895c097051c9bc3dfb6197c2b13a15de203273e1a3218884f86e90e8

C:\Users\Admin\AppData\Local\Temp\_MEI50562\setuptools\_vendor\jaraco.functools-4.0.1.dist-info\top_level.txt

MD5 0ba8d736b7b4ab182687318b0497e61e
SHA1 311ba5ffd098689179f299ef20768ee1a29f586d
SHA256 d099cddcb7d71f82c845f5cbf9014e18227341664edc42f1e11d5dfe5a2ea103
SHA512 7cccbb4afa2fade40d529482301beae152e0c71ee3cc41736eb19e35cfc5ee3b91ef958cf5ca6b7330333b8494feb6682fd833d5aa16bf4a8f1f721fd859832c

C:\Users\Admin\AppData\Local\Temp\_MEI50562\setuptools\_vendor\packaging-24.1.dist-info\WHEEL

MD5 24019423ea7c0c2df41c8272a3791e7b
SHA1 aae9ecfb44813b68ca525ba7fa0d988615399c86
SHA256 1196c6921ec87b83e865f450f08d19b8ff5592537f4ef719e83484e546abe33e
SHA512 09ab8e4daa9193cfdee6cf98ccae9db0601f3dcd4944d07bf3ae6fa5bcb9dc0dcafd369de9a650a38d1b46c758db0721eba884446a8a5ad82bb745fd5db5f9b1

memory/1364-3013-0x0000026EA0FD0000-0x0000026EA0FD1000-memory.dmp

memory/1364-3012-0x0000026EA0FD0000-0x0000026EA0FD1000-memory.dmp

memory/1364-3011-0x0000026EA0FD0000-0x0000026EA0FD1000-memory.dmp

memory/1364-3018-0x0000026EA0FD0000-0x0000026EA0FD1000-memory.dmp

memory/1364-3023-0x0000026EA0FD0000-0x0000026EA0FD1000-memory.dmp

memory/1364-3022-0x0000026EA0FD0000-0x0000026EA0FD1000-memory.dmp

memory/1364-3021-0x0000026EA0FD0000-0x0000026EA0FD1000-memory.dmp

memory/1364-3020-0x0000026EA0FD0000-0x0000026EA0FD1000-memory.dmp

memory/1364-3019-0x0000026EA0FD0000-0x0000026EA0FD1000-memory.dmp

memory/1364-3017-0x0000026EA0FD0000-0x0000026EA0FD1000-memory.dmp

memory/772-3040-0x00007FFB50D80000-0x00007FFB512A9000-memory.dmp

memory/772-3046-0x00007FFB614C0000-0x00007FFB614CB000-memory.dmp

memory/772-3045-0x00007FFB614D0000-0x00007FFB614DD000-memory.dmp

memory/772-3044-0x00007FFB52060000-0x00007FFB5212D000-memory.dmp

memory/772-3043-0x00007FFB614E0000-0x00007FFB61513000-memory.dmp

memory/772-3042-0x00007FFB61920000-0x00007FFB6192D000-memory.dmp

memory/772-3041-0x00007FFB61520000-0x00007FFB61539000-memory.dmp

memory/772-3039-0x00007FFB61540000-0x00007FFB61554000-memory.dmp

memory/772-3038-0x00007FFB61560000-0x00007FFB6158D000-memory.dmp

memory/772-3037-0x00007FFB61590000-0x00007FFB615AA000-memory.dmp

memory/772-3036-0x00007FFB6A560000-0x00007FFB6A56F000-memory.dmp

memory/772-3035-0x00007FFB615B0000-0x00007FFB615D5000-memory.dmp

memory/772-3034-0x00007FFB512B0000-0x00007FFB51975000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI13602\_tcl_data\encoding\euc-cn.enc

MD5 c5aa0d11439e0f7682dae39445f5dab4
SHA1 73a6d55b894e89a7d4cb1cd3ccff82665c303d5c
SHA256 1700af47dc012a48cec89cf1dfae6d1d0d2f40ed731eff6ca55296a055a11c00
SHA512 eee6058bd214c59bcc11e6de7265da2721c119cc9261cfd755a98e270ff74d2d73e3e711aa01a0e3414c46d82e291ef0df2ad6c65ca477c888426d5a1d2a3bc5

C:\Users\Admin\AppData\Local\Temp\_MEI13602\setuptools\_vendor\ordered_set-4.1.0.dist-info\WHEEL

MD5 ff39892a240316bd62b5832c03d504bc
SHA1 3883fc4406cc9a73be0b839c1a0c31d3ddd64829
SHA256 8cf311fc3ce47385f889c42d9b3f35967358fe402c7e883baf2eeaa11bd82d7c
SHA512 b2e57d9c81bbfb7364b8216fc086b8f73c2f2b537e300fb250efb7972e3908f77a3d504363676c50a195d307822c69ee9b689de6c48a4e6b8a6ba89a5a99ac32

C:\Users\Admin\AppData\Local\Temp\_MEI13602\setuptools\_vendor\typeguard-4.3.0.dist-info\LICENSE

MD5 f0e423eea5c91e7aa21bdb70184b3e53
SHA1 a51ccdcb7a9d8c2116d1dfc16f11b3c8a5830f67
SHA256 6163f7987dfb38d6bc320ce2b70b2f02b862bc41126516d552ef1cd43247e758
SHA512 8be742880e6e8495c7ec4c9ecc8f076a9fc9d64fc84b3aebbc8d2d10dc62ac2c5053f33b716212dcb76c886a9c51619f262c460fc4b39a335ce1ae2c9a8769a8

C:\Users\Admin\AppData\Local\Temp\_MEI13602\setuptools\_vendor\typeguard-4.3.0.dist-info\METADATA

MD5 b6daac02f66ac8403e9061881322babe
SHA1 9a94672ccfea06156a5f8a321cd0626cfd233ae8
SHA256 cf675c1c0a744f08580855390de87cc77d676b312582e8d4cfdb5bb8fd298d21
SHA512 9c6b7326c90396aa9e962c2731a1085edb672b5696f95f552d13350843c09a246e0bbf0ec484862dff434fa5a86de4c0b7c963958ade35a066b9d2384076dd47

C:\Users\Admin\AppData\Local\Temp\_MEI13602\setuptools\_vendor\typeguard-4.3.0.dist-info\RECORD

MD5 d680b2881597974acd91750e5ab61010
SHA1 e00ed2416b5ce21641e3946905504d62d536972f
SHA256 48a51959582478352275428ceecd78ef77d79ac9dae796e39a2eaf2540282552
SHA512 112172acb515b0712ac58d78898eb159580ada3dd3f16aabb37cb7a8d964f9e4badf2869a245927b83b208d56904831c0f04ed925c95dfcb705801734fb0c7ba

C:\Users\Admin\AppData\Local\Temp\_MEI13602\setuptools\_vendor\wheel-0.43.0.dist-info\METADATA

MD5 ebea27da14e3f453119dc72d84343e8c
SHA1 7ceb6dbe498b69abf4087637c6f500742ff7e2b4
SHA256 59bac22b00a59d3e5608a56b8cf8efc43831a36b72792ee4389c9cd4669c7841
SHA512 a41593939b9325d40cb67fd3f41cd1c9e9978f162487fb469094c41440b5f48016b9a66be2e6e4a0406d6eedb25ce4f5a860ba1e3dc924b81f63ceee3ae31117

C:\Users\Admin\AppData\Local\Temp\_MEI13602\setuptools\_vendor\wheel-0.43.0.dist-info\RECORD

MD5 44d352c4997560c7bfb82d9360f5985a
SHA1 be58c7b8ab32790384e4e4f20865c4a88414b67a
SHA256 783e654742611af88cd9f00bf01a431a219db536556e63ff981c7bd673070ac9
SHA512 281b1d939a560e6a08d0606e5e8ce15f086b4b45738ab41ed6b5821968dc8d764cd6b25db6ba562a07018c271abf17a6bc5a380fad05696adf1d11ee2c5749c8

C:\Users\Admin\AppData\Local\Temp\_MEI13602\setuptools\_vendor\wheel-0.43.0.dist-info\LICENSE.txt

MD5 7ffb0db04527cfe380e4f2726bd05ebf
SHA1 5b39c45a91a556e5f1599604f1799e4027fa0e60
SHA256 30c23618679108f3e8ea1d2a658c7ca417bdfc891c98ef1a89fa4ff0c9828654
SHA512 205f284f3a7e8e696c70ed7b856ee98c1671c68893f0952eec40915a383bc452b99899bdc401f9fe161a1bf9b6e2cea3bcd90615eee9173301657a2ce4bafe14

C:\Users\Admin\AppData\Local\Temp\_MEI13602\setuptools\_vendor\typeguard-4.3.0.dist-info\top_level.txt

MD5 004a2a8ce1ab120a63902a27d76bd964
SHA1 a4e367ab40410598dadd1fc5f680ed7a176beb09
SHA256 e33dbc021b83a1dc114bf73527f97c1f9d6de50bb07d3b1eb24633971a7a82bb
SHA512 0d8ff9a43897ab390ab41afe5bac8bd38a68c2bef88e844e5b49bf70e3164b226975cc2717ae3dc3428d1cfbb0be068c243f104915fee1ffa58c23fbe76fdb89

C:\Users\Admin\AppData\Local\Temp\_MEI13602\setuptools\_vendor\typeguard-4.3.0.dist-info\entry_points.txt

MD5 aeab5bcf8bf89a51c97c4cdf70578848
SHA1 2e9c1617560ab66431aab90700db901985293485
SHA256 aa9ecd43568bb624a0310aa8ea05a57c6a72d08217ce830999e4132e9cea1594
SHA512 2be73e99296df26a28835f91dd8bc50eb104af06a3c54666175faf322e0ad4620453db0388531c4113b052a92c1d2e4c3088e25af43cde42aa852cf7b0cb5b05

C:\Users\Admin\AppData\Local\Temp\_MEI13602\setuptools\_vendor\wheel-0.43.0.dist-info\entry_points.txt

MD5 6180e17c30bae5b30db371793fce0085
SHA1 e3a12c421562a77d90a13d8539a3a0f4d3228359
SHA256 ad363505b90f1e1906326e10dc5d29233241cd6da4331a06d68ae27dfbc6740d
SHA512 69eae7b1e181d7ba1d3e2864d31e1320625a375e76d3b2fbf8856b3b6515936ace3138d4d442cabde7576fcfbcbb0deed054d90b95cfa1c99829db12a9031e26

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 e765f3d75e6b0e4a7119c8b14d47d8da
SHA1 cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256 986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512 a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

MD5 53bc70ecb115bdbabe67620c416fe9b3
SHA1 af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256 b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512 cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 330c4845da3e19aa7c22c0fe48355dfb
SHA1 576ad27f8aa0bf2d8e62b32ebd06d44aa15d8454
SHA256 3fa95c9a49e01ec4fc997681979502f934e5005024efcbe0db324058d41e3c1c
SHA512 c6c7b35c52354f480940cb2a1d34f8bf2028d6b1d038e3d9fdd2188bc5b238c30233badb924de5e529b312a9a26e46bc44d4477f132eb5fa1a361ea5ac8b60c3

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 928aee0730353003650c44a8443256c2
SHA1 3f4c30a8b545af1452b319a335d85ae300b48b85
SHA256 b939a21bfcf75f3ee59aae21ece948cb5a8bcf6a5fc2138df3fb9c416b369459
SHA512 d4fce87be428cd12087571002597168402c8f71c441806de78d348eb5d9330f3377d8f178ab37307a70e954713ddb2fa77553d53a362151d4565613cddf75d76

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 87835d33ea795d20b4c094f61a8a238e
SHA1 11684440c2d8d83308ceccea1155006e8f841282
SHA256 1450f3ac021a45f5aedad95a29a3a1219a2d1cb5ddfab816b74692b1c826aa0b
SHA512 cd2d5ed5868bd92a53422dfb6597da27617b1fbe936092b263ce23a068f794f4115b2deba5424e957471c235ffaddab2c1a2a9ae59a7a9b3b837f76ca65d5f7b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

MD5 6752a1d65b201c13b62ea44016eb221f
SHA1 58ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA256 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA512 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 943018d6c40187f8917254a5578972a2
SHA1 bbe88f8788a66353c1ba239e7b7b9cfccc364f50
SHA256 9f0dbe40ea7d7e71e02c01901db21d29d3b4ca9221eb3aad6301d37bc0552826
SHA512 4a6bb73447e6cb272b3c645713a58173fc28ea642354ae22998fd6421ff8ca40cb76cf21da6cb9ba9fdf6d48a91942398ba81b10ed250d80a01783e322937c3f

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 f556135727940bb0c31cc7faba9da981
SHA1 04b5ecd656509dd17f201087a1961175f04a03b2
SHA256 ad2b39e23956039548fe9d92350fdda3f8b9213e4d4629a47780ee49550e9d83
SHA512 f1007c8e37bc18f5db7ab00f284a2db1905e719fb0b2f2c0866359be7de297b17377255dfa088bd5860cbb741ec61dc628fcd79dc6b9ece5bc3b598dede6827a

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe5a08ac.TMP

MD5 1af3dfd5ea683a5de8d2a1a1e3d73dcc
SHA1 c8d98527114e4b4db789bb8950b6355dffcfda78
SHA256 5cd6b5f61ade410727841eafecc619afd39ff731f7466133718082600c3022ed
SHA512 00cf988b5b77a3dcbe20158b91f303f6536c809a3a4fbaf18bbb6a2084d1b15f7cadd3fb706e21cee81c80b73301e1eceaeec74275175480b0bd873769aec041

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 87ee83e6700f2d2f816aa25925ce34cb
SHA1 46110e182e71d428d75b897e993688adcb80cc39
SHA256 36718e24a8e4aa316f177de1305b3b1162e315856530848026f6c4076856f6f5
SHA512 1e1f1d327f788077f830a3a4776d2ad2b1dff5026f55d6de389cc0aa54a4d9afa8403509f4102b336a21da6ded5b63920b1c65fd8d02c826f9c36274f704bc5a

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\cd4f4a82-992b-4e3a-a84b-a7be18a54762.tmp

MD5 f7eaf00651709825a9414d86ffc5ce0e
SHA1 eb778cdb696fa3271334d9e80cc0ce2cbdf1a6de
SHA256 2ee3918ad3892b57701ad81d3394df13d384f93e55fd1674f0056135f8cf8322
SHA512 9bfc710e210b2a41e652edd5ea25644186d077d4909e424c2a897bc501fd9748238deae1047718dc0f700e7607d73dc25e72117b25b1649df8da6c0bf41d9d80

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 89fed60aa3b4574c6f6ff8af72b8a008
SHA1 c1894c5709f4d9cba103f0d05f2508d01d9da8ea
SHA256 ded72305dd2d60794d39d004e5fbc781291513b9118f910ab806526966af939d
SHA512 2b8fedd7b484c8fbef8dab0f494a4b24238a8979c015d7d808e9eb93845f662052d526339054febc887b7973b5256591ec9e9e5aead803d2788fdb246db0fb2b

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 7d0dbb39e428bb9fdb1a66e130404304
SHA1 698963bdde6770312e39ef26d0be7f6170577ec4
SHA256 525bbc43cbb525ec5ff0900500823a186359bfe7a80e84adb89346694108df16
SHA512 8f0aaf9132be4b41b2fe312c06fe3814211aa30fb5e7d2310ea46e7e82525dfefce02b556e4f38ba1cf6fc46c6790aacebdb489a4488b581db03a48417163858

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004

MD5 c79d8ef4fd2431bf9ce5fdee0b7a44bf
SHA1 ac642399b6b3bf30fe09c17e55ecbbb5774029ff
SHA256 535e28032abf1bac763bffd0ba968561265026803eb688d3cb0550ad9af1a0e8
SHA512 6b35d8b0d3e7f1821bfaeae337364ed8186085fa50ee2b368d205489a004cb46879efb2c400caf24ba6856625fe7ee1a71c72d2598c18044813ecde431054fb5

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000003

MD5 0f6e110e02a790b2f0635d0815c12e5c
SHA1 2411810c083a7fda31c5e6dd6f1f9cf1b971e46c
SHA256 2f7018f3c214ace280e4bd37aabe0690bd9d8d0532f38e32a29d1f9de1320605
SHA512 2f2fb7c4ddfb6abb5dcde466269f625eea58a2c69d25830e6bb24126e7679ec7c83fdb0d8ff2a7de4dd4b994513f5e80813dbf1f5d6a9a474c3a60d8bee74f4f

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000006

MD5 76a3f1e9a452564e0f8dce6c0ee111e8
SHA1 11c3d925cbc1a52d53584fd8606f8f713aa59114
SHA256 381396157ed5e8021dd8e660142b35eb71a63aecd33062a1103ce9c709c7632c
SHA512 a1156a907649d6f2c3f7256405d9d5c62a626b8d4cd717fa2f29d2fbe91092a2b3fdd0716f8f31e59708fe12274bc2dea6c9ae6a413ea290e70ddf921fe7f274

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000002

MD5 c3c0eb5e044497577bec91b5970f6d30
SHA1 d833f81cf21f68d43ba64a6c28892945adc317a6
SHA256 eb48be34490ec9c4f9402b882166cd82cd317b51b2a49aae75cdf9ee035035eb
SHA512 83d3545a4ed9eed2d25f98c4c9f100ae0ac5e4bc8828dccadee38553b7633bb63222132df8ec09d32eb37d960accb76e7aab5719fc08cc0a4ef07b053f30cf38

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000005

MD5 56d57bc655526551f217536f19195495
SHA1 28b430886d1220855a805d78dc5d6414aeee6995
SHA256 f12de7e272171cda36389813df4ba68eb2b8b23c58e515391614284e7b03c4d4
SHA512 7814c60dc377e400bbbcc2000e48b617e577a21045a0f5c79af163faa0087c6203d9f667e531bbb049c9bd8fb296678e6a5cdcad149498d7f22ffa11236b51cb

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000007

MD5 b38fbbd0b5c8e8b4452b33d6f85df7dc
SHA1 386ba241790252df01a6a028b3238de2f995a559
SHA256 b18b9eb934a5b3b81b16c66ec3ec8e8fecdb3d43550ce050eb2523aabc08b9cd
SHA512 546ca9fb302bf28e3a178e798dd6b80c91cba71d0467257b8ed42e4f845aa6ecb858f718aac1e0865b791d4ecf41f1239081847c75c6fb3e9afd242d3704ad16

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000008

MD5 0aba6b0a3dd73fe8b58e3523c5d7605b
SHA1 9127c57b25121436eaf317fea198b69b386f83c7
SHA256 8341f5eb55983e9877b0fc72b77a5df0f87deda1bc7ad6fa5756e9f00d6b8cac
SHA512 6a266e9dad3015e0c39d6de2e5e04e2cc1af3636f0e856a5dc36f076c794b555d2a580373836a401f8d0d8e510f465eb0241d6e3f15605d55eb212f4283278eb

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 2d9ef0d4f491b4fb246efb8151b604fe
SHA1 558b6eb01f8797e42420513452186686d1491c17
SHA256 9d7381111e310280f645aaae9f114d16b6b578af46fa9a123365637a6e5e7b82
SHA512 dbdfd742d6c6e3b8407bd84165404a637bf0fe989dadc5f1361fb1f9837ee26a315d0cc537b5bc8b5513b52e3b49f685a39ccdc08dbfeb0249f6e1ac1e7bf84f

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 c3eb9387923f16bbc6fe88c4e1c2d97b
SHA1 bca9e721bedd9d12bebba203aa009af5460f606f
SHA256 66a64a5c4b1c9ffb3ac60c93e98f074b04fa16fe9be6ce0eb78ae23d1a359a10
SHA512 a8a2289630df61ae232fe28f47a433b6892368b87bc85053fc2c32cc1d1dfd1aed80bb0da486bf541632eda2fa01d0a5fd52ebb6552077effd0ffcde43a2dbbd

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00001d

MD5 c3bd38af3c74a1efb0a240bf69a7c700
SHA1 7e4b80264179518c362bef5aa3d3a0eab00edccd
SHA256 1151160e75f88cbc8fe3ada9125cc2822abc1386c0eab7a1d5465cfd004522c8
SHA512 41a2852c8a38700cf4b38697f3a6cde3216c50b7ed23d80e16dea7f5700e074f08a52a10ba48d17111bb164c0a613732548fe65648658b52db882cacb87b9e8e

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000b

MD5 cf604c923aae437f0acb62820b25d0fd
SHA1 84db753fe8494a397246ccd18b3bb47a6830bc98
SHA256 e2b4325bb9a706cbfba8f39cca5bde9dae935cbb1d6c8a562c62e740f2208ab4
SHA512 754219b05f2d81d11f0b54e5c7dd687bd82aa59a357a3074bca60fefd3a88102577db8ae60a11eb25cc9538af1da39d25fa6f38997bdc8184924d0c5920e89c8

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_00000a

MD5 209af4da7e0c3b2a6471a968ba1fc992
SHA1 2240c2da3eba4f30b0c3ef2205ce7848ecff9e3f
SHA256 ecc145203f1c562cae7b733a807e9333c51d75726905a3af898154f3cefc9403
SHA512 09201e377e80a3d03616ff394d836c85712f39b65a3138924d62a1f3ede3eac192f1345761c012b0045393c501d48b5a774aeda7ab5d687e1d7971440dc1fc35

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

MD5 72c9db2a1b6777dd0ed8a0f377a86d05
SHA1 f001dfc5a786ea783aef387a0f58d13938fda8a1
SHA256 5f0ef98a69964875ee37573ce48e0f49a6114b56ecf09733d5d1be993bad31d9
SHA512 f6a32078d37333ac630d1bbe575c8bf88c2882f3521d85d9e99a13265a700fb51aae21a1a289826a6cd6e9324cdc125b15018610dc5dede5ad0e5bf331084284

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity

MD5 7c79e5b2f8793e3f35ac8409a2c99eb3
SHA1 59a30d3aa2541fee56f8634678400dcf214122aa
SHA256 d1017c61a61c28dfa7bc8de4723806b45bcec2990da8aa78e942b454411007a8
SHA512 3a067e025ce8963969bf705db3f913d4c89b1adee0a719de973b61e2e612887ba2a3fe2d6a0e5d8f4452c47fbdd0e5164555722dc545b3dec7b3b2ce65277410

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 f9c945fd706b86b449ab481f4ab033db
SHA1 c84d7f3a83ebbf74032f80a0735b16f401c9e071
SHA256 d289502ce6b225c12b00fd5063a15df64a112d59cabf5f01942556bf4c330b2b
SHA512 2f67dcdd30e96bc84eebdae5cf52bf24ad6df2e3b347eba0bc469866fd69618faef7fe8e05031efd304bcace9f6e53d3e348c1c46a9dd67f81c5211b3377170d

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

MD5 bb02bb080efd28ae48816f5658ea175e
SHA1 d56b517466c976be8e654a073f3ce015b9e83a44
SHA256 40f6a81806d175719087d8b70134d73c1fbb070b44bee33affdb6fcbe610d3e0
SHA512 e600d5a7e0c563785959a32cd076f3023b21c31acc62cc2c964f4c8f1f6be2ff2fd083efbec020a7f85a136c5b2083dca853e9395956ad5932c0f9983ecd32c9

C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

MD5 48eb998b1720df9f33641057e2270e8e
SHA1 4a426fa2e15116af7f8af11002313d9e807def64
SHA256 bc7a4b31b64e329ab601e57186c40065f961d98e88a87252613ecdd0449cae8c
SHA512 412e9472b5946b2aae606109ec254f1b39cbfd6a1226c9326986e5d31d35f803effce2f8899d6f42b4b28051b43c2eb2aa812b5653c51de22efb4b9083d73d21