Malware Analysis Report

2024-11-30 12:43

Sample ID 240819-mk3qsssdqk
Target Pysil.zip
SHA256 174436f54900cc5e0791f47bd70444dcf46ae9cec1d55a04776ddfe37ff9e3d4
Tags
pyinstaller pysilon upx discovery evasion execution persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

174436f54900cc5e0791f47bd70444dcf46ae9cec1d55a04776ddfe37ff9e3d4

Threat Level: Known bad

The file Pysil.zip was found to be: Known bad.

Malicious Activity Summary

pyinstaller pysilon upx discovery evasion execution persistence

Pysilon family

Detect Pysilon

Enumerates VirtualBox DLL files

Sets file to hidden

Command and Scripting Interpreter: PowerShell

UPX packed file

Executes dropped EXE

Loads dropped DLL

Legitimate hosting services abused for malware hosting/C2

Adds Run key to start application

Detects Pyinstaller

Unsigned PE

Browser Information Discovery

Views/modifies file attributes

Suspicious use of SetWindowsHookEx

Enumerates system info in registry

Suspicious behavior: EnumeratesProcesses

Suspicious use of FindShellTrayWindow

Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary

Suspicious use of SendNotifyMessage

Suspicious behavior: GetForegroundWindowSpam

Modifies data under HKEY_USERS

Suspicious use of AdjustPrivilegeToken

Kills process with taskkill

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-19 10:32

Signatures

Detect Pysilon

Description Indicator Process Target
N/A N/A N/A N/A

Pysilon family

pysilon

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-19 10:32

Reported

2024-08-19 10:36

Platform

win7-20240708-en

Max time kernel

118s

Max time network

128s

Command Line

"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\source_prepared.exe

"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"

C:\Users\Admin\AppData\Local\Temp\source_prepared.exe

"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"

Network

N/A

Files

C:\Users\Admin\AppData\Local\Temp\_MEI27762\python310.dll

MD5 933b49da4d229294aad0c6a805ad2d71
SHA1 9828e3ce504151c2f933173ef810202d405510a4
SHA256 ab3e996db016ba87004a3c4227313a86919ff6195eb4b03ac1ce523f126f2206
SHA512 6023188f3b412dd12c2d4f3a8e279dcace945b6e24e1f6bbd4e49a5d2939528620ceb9a5f77b9a47d2d0454e472e2999240b81bed0239e7e400a4e25c96e1165

memory/2848-1264-0x000007FEF5960000-0x000007FEF5DCE000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-19 10:32

Reported

2024-08-19 10:36

Platform

win10v2004-20240802-en

Max time kernel

150s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"

Signatures

Enumerates VirtualBox DLL files

Description Indicator Process Target
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Name of built executable visible in Registry Editor = "C:\\Users\\Admin\\Directory name of PySilon malware on target PC\\Executable name of PySilon malware on target PC.exe" C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Modifies data under HKEY_USERS

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133685372549256672" C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe N/A
N/A N/A C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe N/A
N/A N/A C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe N/A
N/A N/A C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe N/A
N/A N/A C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe N/A
N/A N/A C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2664 wrote to memory of 1720 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Users\Admin\AppData\Local\Temp\source_prepared.exe
PID 2664 wrote to memory of 1720 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Users\Admin\AppData\Local\Temp\source_prepared.exe
PID 1720 wrote to memory of 5080 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Windows\system32\cmd.exe
PID 1720 wrote to memory of 5080 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Windows\system32\cmd.exe
PID 1720 wrote to memory of 4544 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1720 wrote to memory of 4544 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1720 wrote to memory of 1468 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Windows\system32\cmd.exe
PID 1720 wrote to memory of 1468 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Windows\system32\cmd.exe
PID 1468 wrote to memory of 3340 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 1468 wrote to memory of 3340 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 1468 wrote to memory of 3644 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe
PID 1468 wrote to memory of 3644 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe
PID 1468 wrote to memory of 1612 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 1468 wrote to memory of 1612 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 3644 wrote to memory of 2820 N/A C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe
PID 3644 wrote to memory of 2820 N/A C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe
PID 2820 wrote to memory of 2636 N/A C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe C:\Windows\system32\cmd.exe
PID 2820 wrote to memory of 2636 N/A C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe C:\Windows\system32\cmd.exe
PID 2820 wrote to memory of 1408 N/A C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2820 wrote to memory of 1408 N/A C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4964 wrote to memory of 5028 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 5028 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 4280 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 3360 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 3360 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 704 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 704 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 704 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 704 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 704 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 704 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 704 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 704 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 704 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 4964 wrote to memory of 704 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\source_prepared.exe

"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"

C:\Users\Admin\AppData\Local\Temp\source_prepared.exe

"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x2ec 0x398

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Directory name of PySilon malware on target PC\""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Directory name of PySilon malware on target PC\activate.bat""

C:\Windows\system32\attrib.exe

attrib +s +h .

C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe

"Executable name of PySilon malware on target PC.exe"

C:\Windows\system32\taskkill.exe

taskkill /f /im "source_prepared.exe"

C:\Users\Admin\Directory name of PySilon malware on target PC\Executable name of PySilon malware on target PC.exe

"Executable name of PySilon malware on target PC.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Directory name of PySilon malware on target PC\""

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ffec3eecc40,0x7ffec3eecc4c,0x7ffec3eecc58

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,2837278583936338906,3828915555147271259,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1920 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2172,i,2837278583936338906,3828915555147271259,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=1784 /prefetch:3

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2296,i,2837278583936338906,3828915555147271259,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=2644 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,2837278583936338906,3828915555147271259,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3188 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3300,i,2837278583936338906,3828915555147271259,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3280 /prefetch:1

C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4572,i,2837278583936338906,3828915555147271259,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4604 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4800,i,2837278583936338906,3828915555147271259,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4760 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4996,i,2837278583936338906,3828915555147271259,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5056 /prefetch:8

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=5184,i,2837278583936338906,3828915555147271259,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4740 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --field-trial-handle=3172,i,2837278583936338906,3828915555147271259,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=4464 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=3500,i,2837278583936338906,3828915555147271259,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=3496 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --field-trial-handle=5136,i,2837278583936338906,3828915555147271259,262144 --variations-seed-version=20240801-180145.014000 --mojo-platform-channel-handle=5424 /prefetch:1

Network

Country Destination Domain Proto
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 73.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 discord.com udp
US 162.159.137.232:443 discord.com tcp
US 162.159.136.232:443 discord.com tcp
US 162.159.135.232:443 discord.com tcp
US 162.159.138.232:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 8.8.8.8:53 232.137.159.162.in-addr.arpa udp
US 8.8.8.8:53 232.136.159.162.in-addr.arpa udp
US 8.8.8.8:53 232.135.159.162.in-addr.arpa udp
US 8.8.8.8:53 232.138.159.162.in-addr.arpa udp
US 8.8.8.8:53 233.128.159.162.in-addr.arpa udp
N/A 127.0.0.1:62963 tcp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp
US 8.8.8.8:53 www.google.com udp
FR 172.217.20.196:443 www.google.com tcp
FR 172.217.20.196:443 www.google.com udp
US 8.8.8.8:53 chrome.google.com udp
FR 216.58.214.174:443 chrome.google.com tcp
US 8.8.8.8:53 227.74.250.142.in-addr.arpa udp
US 8.8.8.8:53 170.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 196.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 174.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 clients2.google.com udp
N/A 224.0.0.251:5353 udp
FR 142.250.178.142:443 clients2.google.com udp
FR 142.250.178.142:443 clients2.google.com tcp
US 8.8.8.8:53 142.178.250.142.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 52.111.227.13:443 tcp
US 8.8.8.8:53 21.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 www.mediafire.com udp
US 104.16.114.74:443 www.mediafire.com tcp
US 104.16.114.74:443 www.mediafire.com tcp
US 8.8.8.8:53 the.gatekeeperconsent.com udp
US 172.67.199.186:443 the.gatekeeperconsent.com tcp
US 8.8.8.8:53 beacons.gcp.gvt2.com udp
US 8.8.8.8:53 74.114.16.104.in-addr.arpa udp
US 8.8.8.8:53 186.199.67.172.in-addr.arpa udp
US 8.8.8.8:53 168.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 btloader.com udp
US 8.8.8.8:53 privacy.gatekeeperconsent.com udp
US 8.8.8.8:53 www.ezojs.com udp
US 8.8.8.8:53 translate.google.com udp
US 8.8.8.8:53 static.cloudflareinsights.com udp
US 8.8.8.8:53 cdn.amplitude.com udp
US 8.8.8.8:53 static.mediafire.com udp
US 104.16.114.74:443 static.mediafire.com udp
US 142.250.69.3:443 beacons.gcp.gvt2.com tcp
US 8.8.8.8:53 cdn.otnolatrnup.com udp
US 172.67.41.60:443 btloader.com tcp
US 172.67.199.186:443 privacy.gatekeeperconsent.com tcp
US 8.8.8.8:53 www.mediafiredls.com udp
US 104.16.52.110:443 cdn.otnolatrnup.com tcp
US 172.67.73.78:443 www.mediafiredls.com tcp
US 172.67.41.60:443 btloader.com tcp
US 172.67.199.186:443 privacy.gatekeeperconsent.com tcp
US 104.16.52.110:443 cdn.otnolatrnup.com tcp
US 172.67.73.78:443 www.mediafiredls.com tcp
US 8.8.8.8:53 otnolatrnup.com udp
US 172.67.199.186:443 privacy.gatekeeperconsent.com udp
US 172.67.199.186:443 privacy.gatekeeperconsent.com udp
US 172.67.199.186:443 privacy.gatekeeperconsent.com udp
US 8.8.8.8:53 3.69.250.142.in-addr.arpa udp
US 8.8.8.8:53 60.41.67.172.in-addr.arpa udp
US 8.8.8.8:53 110.52.16.104.in-addr.arpa udp
GB 18.154.84.84:443 cdn.amplitude.com tcp
US 104.21.63.106:443 www.ezojs.com tcp
FR 216.58.214.174:443 translate.google.com tcp
US 104.16.79.73:443 static.cloudflareinsights.com tcp
US 8.8.8.8:53 ad-delivery.net udp
US 172.67.69.19:443 ad-delivery.net tcp
US 172.67.69.19:443 ad-delivery.net tcp
US 8.8.8.8:53 content-autofill.googleapis.com udp
US 172.67.73.78:443 www.mediafiredls.com tcp
US 8.8.8.8:53 tags.crwdcntrl.net udp
US 8.8.8.8:53 ad.crwdcntrl.net udp
US 8.8.8.8:53 bcp.crwdcntrl.net udp
FR 172.217.20.170:443 content-autofill.googleapis.com tcp
US 8.8.8.8:53 api.btloader.com udp
IE 34.246.85.224:443 bcp.crwdcntrl.net tcp
IE 52.50.3.125:443 bcp.crwdcntrl.net tcp
GB 13.224.81.88:443 tags.crwdcntrl.net tcp
US 130.211.23.194:443 api.btloader.com tcp
US 8.8.8.8:53 a.nel.cloudflare.com udp
US 35.190.80.1:443 a.nel.cloudflare.com tcp
FR 172.217.20.170:443 content-autofill.googleapis.com tcp
US 8.8.8.8:53 translate.googleapis.com udp
FR 172.217.20.202:443 translate.googleapis.com tcp
US 130.211.23.194:443 api.btloader.com tcp
US 8.8.8.8:53 translate-pa.googleapis.com udp
US 8.8.8.8:53 analytics.google.com udp
US 8.8.8.8:53 stats.g.doubleclick.net udp
FR 142.250.201.170:443 translate-pa.googleapis.com tcp
BE 142.251.173.154:443 stats.g.doubleclick.net tcp
US 216.239.36.181:443 analytics.google.com tcp
FR 172.217.20.170:443 translate-pa.googleapis.com udp
US 8.8.8.8:53 84.84.154.18.in-addr.arpa udp
US 8.8.8.8:53 106.63.21.104.in-addr.arpa udp
US 8.8.8.8:53 19.69.67.172.in-addr.arpa udp
US 8.8.8.8:53 70.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 78.73.67.172.in-addr.arpa udp
US 8.8.8.8:53 88.81.224.13.in-addr.arpa udp
US 8.8.8.8:53 224.85.246.34.in-addr.arpa udp
US 8.8.8.8:53 125.3.50.52.in-addr.arpa udp
US 8.8.8.8:53 1.80.190.35.in-addr.arpa udp
US 8.8.8.8:53 202.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 194.23.211.130.in-addr.arpa udp
US 8.8.8.8:53 170.20.217.172.in-addr.arpa udp
US 35.190.80.1:443 a.nel.cloudflare.com udp
US 8.8.8.8:53 g.ezoic.net udp
FR 13.37.187.223:443 g.ezoic.net tcp
US 8.8.8.8:53 go.ezodn.com udp
US 8.8.8.8:53 67.179.250.142.in-addr.arpa udp
US 8.8.8.8:53 170.201.250.142.in-addr.arpa udp
US 8.8.8.8:53 238.75.250.142.in-addr.arpa udp
US 8.8.8.8:53 181.36.239.216.in-addr.arpa udp
US 8.8.8.8:53 154.173.251.142.in-addr.arpa udp
US 8.8.8.8:53 223.187.37.13.in-addr.arpa udp
US 8.8.8.8:53 api.amplitude.com udp
US 104.21.87.79:443 go.ezodn.com tcp
US 104.21.87.79:443 go.ezodn.com tcp
US 104.21.87.79:443 go.ezodn.com tcp
US 35.82.19.115:443 api.amplitude.com tcp
US 8.8.8.8:53 g.ezodn.com udp
US 104.21.87.79:443 g.ezodn.com tcp
US 104.21.87.79:443 g.ezodn.com tcp
US 104.21.87.79:443 g.ezodn.com tcp
US 8.8.8.8:53 securepubads.g.doubleclick.net udp
FR 172.217.20.162:443 securepubads.g.doubleclick.net tcp
US 104.21.87.79:443 g.ezodn.com udp
FR 13.37.187.223:443 g.ezoic.net tcp
FR 172.217.20.162:443 securepubads.g.doubleclick.net tcp
US 8.8.8.8:53 bshr.ezodn.com udp
US 172.67.142.121:443 bshr.ezodn.com tcp
US 8.8.8.8:53 79.87.21.104.in-addr.arpa udp
US 8.8.8.8:53 115.19.82.35.in-addr.arpa udp
US 8.8.8.8:53 121.142.67.172.in-addr.arpa udp
US 172.67.142.121:443 bshr.ezodn.com udp
US 8.8.8.8:53 download1321.mediafire.com udp
US 8.8.8.8:53 googleads.g.doubleclick.net udp
FR 216.58.214.162:443 googleads.g.doubleclick.net tcp
US 205.196.123.9:443 download1321.mediafire.com tcp
FR 172.217.20.162:443 securepubads.g.doubleclick.net udp
US 205.196.123.9:443 download1321.mediafire.com tcp
US 104.16.53.110:443 otnolatrnup.com tcp
US 104.16.53.110:443 otnolatrnup.com tcp
US 8.8.8.8:53 fundingchoicesmessages.google.com udp
US 8.8.8.8:53 226.75.250.142.in-addr.arpa udp
US 8.8.8.8:53 162.20.217.172.in-addr.arpa udp
US 8.8.8.8:53 9.123.196.205.in-addr.arpa udp
US 8.8.8.8:53 110.53.16.104.in-addr.arpa udp
FR 216.58.214.174:443 fundingchoicesmessages.google.com udp
US 104.16.53.110:443 otnolatrnup.com udp
FR 172.217.20.202:443 translate-pa.googleapis.com udp
US 104.16.53.110:80 otnolatrnup.com tcp
US 104.16.53.110:80 otnolatrnup.com tcp
US 8.8.8.8:53 woreppercomming.com udp
GB 54.230.10.111:443 woreppercomming.com tcp
US 8.8.8.8:53 162.214.58.216.in-addr.arpa udp
US 8.8.8.8:53 www.chancial.com udp
US 172.67.141.135:443 www.chancial.com tcp
FR 216.58.214.174:443 fundingchoicesmessages.google.com udp
US 8.8.8.8:53 111.10.230.54.in-addr.arpa udp
US 8.8.8.8:53 135.141.67.172.in-addr.arpa udp
US 216.239.36.181:443 analytics.google.com udp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI26642\python310.dll

MD5 933b49da4d229294aad0c6a805ad2d71
SHA1 9828e3ce504151c2f933173ef810202d405510a4
SHA256 ab3e996db016ba87004a3c4227313a86919ff6195eb4b03ac1ce523f126f2206
SHA512 6023188f3b412dd12c2d4f3a8e279dcace945b6e24e1f6bbd4e49a5d2939528620ceb9a5f77b9a47d2d0454e472e2999240b81bed0239e7e400a4e25c96e1165

memory/1720-1266-0x00007FFECAAE0000-0x00007FFECAF4E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI26642\VCRUNTIME140.dll

MD5 870fea4e961e2fbd00110d3783e529be
SHA1 a948e65c6f73d7da4ffde4e8533c098a00cc7311
SHA256 76fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644
SHA512 0b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88

C:\Users\Admin\AppData\Local\Temp\_MEI26642\base_library.zip

MD5 ecf379cfbba3700e600c14f97787a80a
SHA1 d69012935da8adbfd5fa2e9234eb05232e22fef4
SHA256 3894257c825f74b77e048bdfe56ecdec86a5a7cb735723c32bb4cc3d8d548314
SHA512 2165e37cacdd19ab5f94239efe13fcc280c5c87c2ef86f58fc92889545f025d7b7e832208d550348373c7ba4b47614ee552bbd61fbe8f2c95b47b621d59210e7

C:\Users\Admin\AppData\Local\Temp\_MEI26642\python3.DLL

MD5 c17b7a4b853827f538576f4c3521c653
SHA1 6115047d02fbbad4ff32afb4ebd439f5d529485a
SHA256 d21e60f3dfbf2bab0cc8a06656721fa3347f026df10297674fc635ebf9559a68
SHA512 8e08e702d69df6840781d174c4565e14a28022b40f650fda88d60172be2d4ffd96a3e9426d20718c54072ca0da27e0455cc0394c098b75e062a27559234a3df7

C:\Users\Admin\AppData\Local\Temp\_MEI26642\_ctypes.pyd

MD5 fab57c847ccd83d1eda8d0f70223284c
SHA1 9036fb9ddf58384d41805b0f5701d0dd3fc9fe5d
SHA256 f94440debb2c034d504859edb115ae1ba3ec3f65a084178c810eada77cc0b803
SHA512 4dfff55c12415fcf4b75594bee323423a8bcf7cbec0384978d2cde23c803aa447e9935e3990e5f87aa70e4187890ac1b4bed68780bda479707e17a68d6dd398d

C:\Users\Admin\AppData\Local\Temp\_MEI26642\libffi-7.dll

MD5 36b9af930baedaf9100630b96f241c6c
SHA1 b1d8416250717ed6b928b4632f2259492a1d64a4
SHA256 d2159e1d1c9853558b192c75d64033e09e7de2da2b3f1bf26745124ed33fbf86
SHA512 5984b32a63a4440a13ebd2f5ca0b22f1391e63ac15fe67a94d4a579d58b8bb0628980a2be484ac65ad3a215bbe44bd14fe33ec7b3581c6ab521f530395847dd5

memory/1720-1277-0x00007FFEE0AF0000-0x00007FFEE0AFF000-memory.dmp

memory/1720-1274-0x00007FFED9E50000-0x00007FFED9E74000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI26642\_bz2.pyd

MD5 9ae5b35c4be5684c4e20eca61c31b04f
SHA1 22ce82be0de9ce1975daf9779f4c03373579d2ee
SHA256 9ecc29ef0eb63bfd91880bd13d1a8e8ae81d6dfd3cb0608410c1c24338e0760f
SHA512 0784831b295680d5e53b3e94e7262fbb6554e7100ed66d33c370151a385ae7e979204cde55dc00ec75874e8a52152b8caf8eeaa446f3e6421322dac5af6f7666

C:\Users\Admin\AppData\Local\Temp\_MEI26642\_lzma.pyd

MD5 c1b2399c226b9010dfaa6a1022c636b0
SHA1 d5dfca039b69b32ad8b5d65c197e0f59fb7aa954
SHA256 6a962508477ac29ae37b40e9fe6444382a528390fe4a0c8f1685cabcf91f1e94
SHA512 45dc18daf7b3c8e9350aa71ae0b58e452fa275a4fb25dbc26c003e46c49b73b7606c86a7c7e0e2dd91e30bdd35c3007843f9d749a7e6138d953e60a839186d02

C:\Users\Admin\AppData\Local\Temp\_MEI26642\libjpeg-9.dll

MD5 c22b781bb21bffbea478b76ad6ed1a28
SHA1 66cc6495ba5e531b0fe22731875250c720262db1
SHA256 1eed2385030348c84bbdb75d41d64891be910c27fab8d20fc9e85485fcb569dd
SHA512 9b42cad4a715680a27cd79f466fd2913649b80657ff042528cba2946631387ed9fb027014d215e1baf05839509ca5915d533b91aa958ae0525dea6e2a869b9e4

C:\Users\Admin\AppData\Local\Temp\_MEI26642\_hashlib.pyd

MD5 0dc4e915d9735acac7b8661a6d542d5a
SHA1 10b449ab2b24cf5e7cad394c21d91434f3cd543a
SHA256 0855543e345e479921761853f7fbbe8834fef7e0f950ca4e087e8e19c3f35271
SHA512 51cd2c7c66a3d9fb4cf99df01de388c11429a961542a6454509131e1dbe776ca040668e50141f3abaab8f760484240c22e047a278dd3ce932745075efab33139

C:\Users\Admin\AppData\Local\Temp\_MEI26642\libcrypto-1_1.dll

MD5 8e7025186c1c6f3f61198c027ff38627
SHA1 79c6f11358c38bda0c12ee1e3ab90a21f4651fa1
SHA256 f393f54886674e42bb7667087c92af67bd46e542c44ddff11c5061481261c90e
SHA512 4bbbf7d0a51aec361779d7735c6a91f1bdd468da0aaa3626c3cb52128c998d6454be8c473c8743172ffcea9dc66403a5a81ff5535d9baf87fa6ab990a35add41

memory/1720-1324-0x00007FFED9DE0000-0x00007FFED9DF4000-memory.dmp

memory/1720-1326-0x00007FFECA760000-0x00007FFECAAD5000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI26642\_uuid.pyd

MD5 aa65dc954ce85134a8f5d8604fa543aa
SHA1 75a31d76c85b3a78c906c0564fa7763e74c2fc49
SHA256 d7b691db91a6bdad2256c8ef392b12126090c8f4d1b43bfd3ec5a020b7f6a7ab
SHA512 e40b03e6f0f405295b3cde5e7f5b3fdbb20de04e9715b4a31eebddf800918d86ac1b74431bb74ed94c4326d77699dd7b8bbe884d5718f0a95ca1d04f4690ea9b

C:\Users\Admin\AppData\Local\Temp\_MEI26642\_tkinter.pyd

MD5 28522a9d0fbcfd414d9c41d853b15665
SHA1 801a62e40b573bccf14ac362520cd8e23c48d4a4
SHA256 3898b004d31aec23cf12c61f27215a14a838d6c11d2bc7738b15730518154bb5
SHA512 e7e715c61db3c420cdee4425d67e05973616e60e23308ef2a24e4a25deeeb8d4802de1cd5cf6a997cec2e9ebad29a4c197b885f8d43e9f7b2b015e9c026782e8

C:\Users\Admin\AppData\Local\Temp\_MEI26642\_ssl.pyd

MD5 38ca1ba20bfff771bb89b1be9fb5857b
SHA1 8bfafe01eb4153da807af132d6b6c0c6e5af03e4
SHA256 ed91c75638b9ee9a6ff771a735d6ccbb9273b9fcbbe5ee8734ee0130e3b8966e
SHA512 c5e0ed2b4d24e628bdc275f9540d7316a42af0cf098b3fa1232a270c7cb68110120a884c5cea254220b9a58f9a16ee12cc394e54bc43982271c88f6cb0a7a80b

C:\Users\Admin\AppData\Local\Temp\_MEI26642\_sqlite3.pyd

MD5 94200ad6269a8af1699b3842d27f87d7
SHA1 a8cf636639ff3e30675cc2c54e5eb4ce86dce8a5
SHA256 ee93640e7fb77633e6e0bc96176fe87e44cbfc92668eab3f7748f6fc9770bece
SHA512 aec9b13cd67c5873d6ceb795edda5784eda5829cd877bc022d03c9d994e4f3a42b4e4846543364a37866ed20e4d736f72eca1224f5684be1b88dd8f7e0d31bde

C:\Users\Admin\AppData\Local\Temp\_MEI26642\_socket.pyd

MD5 4d8292c93191560e28fb7b07da0c7a18
SHA1 581496c7cdc4d21831b319e4fbddeefd0e199325
SHA256 d1f5ea3f8990b244383745d21b69d3049889edaa19cb2f4d2962569c09e74585
SHA512 e9368c79b0377d94b1a5fef914c11856b5953d765e2b0eb7ae4020cd69176c705d7853d787bf3e0d076cb289d41e78e0dfb16c8abbe981e1e9535c73b690f271

C:\Users\Admin\AppData\Local\Temp\_MEI26642\select.pyd

MD5 8b91bc5b3b28d3249b1886c3486727b7
SHA1 17e07af111d3c7dc0a1525dba5ca8360692360f8
SHA256 e88ae878cf7760a627c5af55fafa7e368c8d0bbc8b8a8d4af994d45dbf793cc2
SHA512 dd30cb9ee09a6195500a0d3cca7677e2d63d55637324f2f41aed7feaca148af81d318808d82782bf3f37f0a6c85ef14384ea01f1da5a527e4d68b24f1143f238

C:\Users\Admin\AppData\Local\Temp\_MEI26642\libssl-1_1.dll

MD5 0bfdc638fbe4135514de3aebf59fa410
SHA1 963addfdadf918339dfcab33e07bb6c48c86099e
SHA256 77affb7e88ab70fa04e382e29bf04a94ddf36c5cbd88b29ff33e15912d83ed01
SHA512 768abcc391eea4a3b34b0aade99932cd9befb922dcf9e720edf4c4719938214236e8668eca67026bd07567fbd10bbba98d63f47d63a81c7be1adce3bdd1973e4

memory/1720-1334-0x00007FFECA3F0000-0x00007FFECA4A8000-memory.dmp

memory/1720-1332-0x00007FFED9C20000-0x00007FFED9C4E000-memory.dmp

memory/1720-1331-0x00007FFEDA870000-0x00007FFEDA87D000-memory.dmp

memory/1720-1330-0x00007FFED9C50000-0x00007FFED9C69000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI26642\_queue.pyd

MD5 5bd3fbb7f1171cffe63b6b47e5e5fb15
SHA1 d515256427a6226a6e4427f50609150dab6932d0
SHA256 7c58a79fa60ed0c4cdc7cfca402f253a0ca9d3ae5e44a874f5c985b63d747846
SHA512 4dca6f530cddb7ed1900c55e6700418ba35c7152c7cf81fae3560abdfee44bf6e27f9732a3bad41b91d87399c5759153efedff07d51f279b992c0638efc38e14

memory/1720-1341-0x00007FFED9E50000-0x00007FFED9E74000-memory.dmp

memory/1720-1340-0x00007FFEDA600000-0x00007FFEDA60B000-memory.dmp

memory/1720-1339-0x00007FFED9D60000-0x00007FFED9D86000-memory.dmp

memory/1720-1338-0x00007FFEDA650000-0x00007FFEDA65D000-memory.dmp

memory/1720-1337-0x00007FFECAAE0000-0x00007FFECAF4E000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI26642\charset_normalizer\md.cp310-win_amd64.pyd

MD5 7568ff19fec3c28472dc2a86fc0df3a4
SHA1 ee85f762f30537b24e1ce3735ccff8fd833b3b2f
SHA256 32d3b38090be0e405089fbd173aa9b36c821fbd6b9b55a87c53491844d0de4f1
SHA512 9b68ae10bf803c446f244336dc7086bbcfba16264a8a7957e972beedb9dddecd862649948bb4a3d2857fd885ba972cefcef7880a79f6d534c4689950cb1c3d69

C:\Users\Admin\AppData\Local\Temp\_MEI26642\_overlapped.pyd

MD5 a752451482e3a12bb548d671dfdb8b45
SHA1 cd1b4b5fb4bd967a88f22a309fc4f91df2c5a6e9
SHA256 6c415e1ff4c4cc218c8b3df6678f1eab8d4206bd269f68512910fa04b64b8f22
SHA512 841408f1e01ac372e80882fd2e38207a92a26d5c445172ddc776279e5b08572b72a88011402d644135db145fd0893278999a09db15cc18920103b90fdb76de56

C:\Users\Admin\AppData\Local\Temp\_MEI26642\_multiprocessing.pyd

MD5 9e1a8a2209262745323a3087e3ca5356
SHA1 db5db846be89ed930291afd3e0b5ee31f3e8a50e
SHA256 f7bc9e58a91241d120998e2125173b8ce05fb178e4c77825bcae0f9afd751769
SHA512 bb5741285b773b36a2c24f15d28d172cb96220a662111a587f5ea6a9652a3e09b4795737ae8d2785243990039ebb8f7a597423e3dbd9a69a9cc4917222fa65e7

C:\Users\Admin\AppData\Local\Temp\_MEI26642\_elementtree.pyd

MD5 ad2229ca1802fc2408b59d9ec9460cea
SHA1 f090c8647c2f21c2d46384b9562238559846d793
SHA256 d175def644ad25a6447b3c84fd0aafd75f8f9adf177f3ae9c78d61bfed04b8a0
SHA512 7168cf9ca6ac49f935303e741b3f0e4edee384a2fa64fb4100eebda0e012b4b5aa1a08acba62643debc638c25c6462393ddcd132f7a02c5ed207cd37fda8d895

C:\Users\Admin\AppData\Local\Temp\_MEI26642\_decimal.pyd

MD5 cf941d45cafbebd95dcb1dca58da1b0d
SHA1 94cbcd0f53286afedadd262634fb72a341ceeeba
SHA256 4094591722d9ee58d739ebcdabf5c6c128014ff19c337b5b2924d0171929a5c0
SHA512 9b29c7813c04838f343f08cf12a3a8c05830776551c49af8ed0c025bc4e3074f29dc7c1cfbd9ede879ddee6642adb9bd6fe01aef6ca4a9c6d3c8ecc245a9285c

C:\Users\Admin\AppData\Local\Temp\_MEI26642\_cffi_backend.cp310-win_amd64.pyd

MD5 c23061a08faf3a6595065d1588a68840
SHA1 9e9c5e4877298df1d91d28e204dc3bdfa69d6b45
SHA256 49893c8f3e186203dbf2ff912aeb58bdf3e393560fd33582a75fa3356a9ea545
SHA512 0f41a37a59fb7952863f438e589ce057486191e2bd7face4fb68d90b89a488cd8614623655bb1e41b28124fea836f509c6dfb80941c9dbd6524e660e757e4b55

C:\Users\Admin\AppData\Local\Temp\_MEI26642\_asyncio.pyd

MD5 bac1b37093d9a3d8a69c4449067daf79
SHA1 6debc17c8446915b7413685da449f028cf284549
SHA256 b4130ab50e425027634a8a4c01c320a70b8529f2988c3a7fb053e07847b68089
SHA512 24e108ed396c15fe70a4c915a5adadbfaddacab93d20109574b2f3875ed76225f2444098f2f2c47613f5df16d31c5c93dcc77f5af7b6d9b7739d1e392260ec59

C:\Users\Admin\AppData\Local\Temp\_MEI26642\zlib1.dll

MD5 ee06185c239216ad4c70f74e7c011aa6
SHA1 40e66b92ff38c9b1216511d5b1119fe9da6c2703
SHA256 0391066f3e6385a9c0fe7218c38f7bd0b3e0da0f15a98ebb07f1ac38d6175466
SHA512 baae562a53d491e19dbf7ee2cff4c13d42de6833036bfdaed9ed441bcbf004b68e4088bd453b7413d60faaf1b334aee71241ba468437d49050b8ccfa9232425d

C:\Users\Admin\AppData\Local\Temp\_MEI26642\VCRUNTIME140_1.dll

MD5 bba9680bc310d8d25e97b12463196c92
SHA1 9a480c0cf9d377a4caedd4ea60e90fa79001f03a
SHA256 e0b66601cc28ecb171c3d4b7ac690c667f47da6b6183bff80604c84c00d265ab
SHA512 1575c786ac3324b17057255488da5f0bc13ad943ac9383656baf98db64d4ec6e453230de4cd26b535ce7e8b7d41a9f2d3f569a0eff5a84aeb1c2f9d6e3429739

C:\Users\Admin\AppData\Local\Temp\_MEI26642\unicodedata.pyd

MD5 7b9d6bb4bae7177720e25f3ce6cf6799
SHA1 b316d70aa7d09c047a516f0bc5fb6b3469eeb072
SHA256 286fa59eeec3b6eb2382cb7a1c92da3b70ba5308bd5435e793cf9579da0a97a3
SHA512 efda641a23363d2e5e6a1f19fa064fdba5a2ba9ae8deab3e8b8b45bed144d5209776a063f165f22365904797a4642f39aa9cec3dd153106a641bf13e067f7ad1

memory/1720-1342-0x00007FFECA640000-0x00007FFECA758000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI26642\tk86t.dll

MD5 19adc6ec8b32110665dffe46c828c09f
SHA1 964eca5250e728ea2a0d57dda95b0626f5b7bf09
SHA256 6d134200c9955497c5829860f7373d99eec8cbe4936c8e777b996da5c3546ba7
SHA512 4baa632c45a97dc2ca0f0b52fd3882d083b9d83a88e0fa2f29b269e16ad7387029423839756ee052348589b216509a85f5d6ee05a1e8a1850ce5d673ae859c27

C:\Users\Admin\AppData\Local\Temp\_MEI26642\tcl86t.dll

MD5 2ac611c106c5271a3789c043bf36bf76
SHA1 1f549bff37baf84c458fc798a8152cc147aadf6e
SHA256 7410e4e74a3f5941bb161fc6fc8675227de2ad28a1cec9b627631faa0ed330e6
SHA512 3763a63f45fc48f0c76874704911bcefe0ace8d034f9af3ea1401e60aa993fda6174ae61b951188bec009a14d7d33070b064e1293020b6fd4748bee5c35bbd08

memory/1720-1343-0x00007FFED9BE0000-0x00007FFED9C16000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI26642\sqlite3.dll

MD5 8d6dba91698b6f58e39828b5ced7f5e7
SHA1 6219675b87355d30ef6531b8a98c9a2b388548df
SHA256 7214db734027b5517c79500bb7123bcbe27c36c284081dffe3acbc8803b0d1c0
SHA512 8c61b254db4ca15b3439c346a1ab0fbf298d93fa534722d990e103c47a2c81c9ad2d695a7202ec8da550c83ed3fa5107def44f0c2615a12a28bd11c9c2f4aaaf

C:\Users\Admin\AppData\Local\Temp\_MEI26642\SDL2_ttf.dll

MD5 eb0ce62f775f8bd6209bde245a8d0b93
SHA1 5a5d039e0c2a9d763bb65082e09f64c8f3696a71
SHA256 74591aab94bb87fc9a2c45264930439bbc0d1525bf2571025cd9804e5a1cd11a
SHA512 34993240f14a89179ac95c461353b102ea74e4180f52c206250bb42c4c8427a019ea804b09a6903674ac00ab2a3c4c686a86334e483110e79733696aa17f4eb6

C:\Users\Admin\AppData\Local\Temp\_MEI26642\SDL2_mixer.dll

MD5 b7b45f61e3bb00ccd4ca92b2a003e3a3
SHA1 5018a7c95dc6d01ba6e3a7e77dd26c2c74fd69bc
SHA256 1327f84e3509f3ccefeef1c12578faf04e9921c145233687710253bf903ba095
SHA512 d3449019824124f3edbda57b3b578713e9c9915e173d31566cd8e4d18f307ac0f710250fe6a906dd53e748db14bfa76ec1b58a6aef7d074c913679a47c5fdbe7

C:\Users\Admin\AppData\Local\Temp\_MEI26642\SDL2_image.dll

MD5 25e2a737dcda9b99666da75e945227ea
SHA1 d38e086a6a0bacbce095db79411c50739f3acea4
SHA256 22b27380d4f1f217f0e5d5c767e5c244256386cd9d87f8ddf303baaf9239fc4c
SHA512 63de988387047c17fd028a894465286fd8f6f8bd3a1321b104c0ceb5473e3e0b923153b4999143efbdd28684329a33a5b468e43f25214037f6cddd4d1884adb8

C:\Users\Admin\AppData\Local\Temp\_MEI26642\SDL2.dll

MD5 ec3c1d17b379968a4890be9eaab73548
SHA1 7dbc6acee3b9860b46c0290a9b94a344d1927578
SHA256 aaa11e97c3621ed680ff2388b91acb394173b96a6e8ffbf3b656079cd00a0b9f
SHA512 06a7880ec80174b48156acd6614ab42fb4422cd89c62d11a7723a3c872f213bfc6c1006df8bdc918bb79009943d2b65c6a5c5e89ad824d1a940ddd41b88a1edb

memory/1720-1298-0x00007FFED9E00000-0x00007FFED9E2D000-memory.dmp

memory/1720-1352-0x00007FFED9A80000-0x00007FFED9A8C000-memory.dmp

memory/1720-1356-0x00007FFED95F0000-0x00007FFED95FE000-memory.dmp

memory/1720-1360-0x00007FFED5810000-0x00007FFED581C000-memory.dmp

memory/1720-1361-0x00007FFECA3F0000-0x00007FFECA4A8000-memory.dmp

memory/1720-1364-0x00007FFED51D0000-0x00007FFED51DD000-memory.dmp

memory/1720-1363-0x00007FFED51E0000-0x00007FFED51EC000-memory.dmp

memory/1720-1362-0x00007FFED9D60000-0x00007FFED9D86000-memory.dmp

memory/1720-1359-0x00007FFED5820000-0x00007FFED582B000-memory.dmp

memory/1720-1358-0x00007FFED95D0000-0x00007FFED95DB000-memory.dmp

memory/1720-1357-0x00007FFED95E0000-0x00007FFED95EC000-memory.dmp

memory/1720-1355-0x00007FFED9C20000-0x00007FFED9C4E000-memory.dmp

memory/1720-1353-0x00007FFED9C50000-0x00007FFED9C69000-memory.dmp

memory/1720-1354-0x00007FFED9600000-0x00007FFED960C000-memory.dmp

memory/1720-1369-0x00007FFED5110000-0x00007FFED5125000-memory.dmp

memory/1720-1370-0x00007FFED5190000-0x00007FFED51A0000-memory.dmp

memory/1720-1368-0x00007FFED9BE0000-0x00007FFED9C16000-memory.dmp

memory/1720-1367-0x00007FFED51A0000-0x00007FFED51AC000-memory.dmp

memory/1720-1372-0x00007FFED2E50000-0x00007FFED2E72000-memory.dmp

memory/1720-1371-0x00007FFED2E80000-0x00007FFED2E94000-memory.dmp

memory/1720-1366-0x00007FFED51B0000-0x00007FFED51C2000-memory.dmp

memory/1720-1375-0x00007FFED1510000-0x00007FFED155D000-memory.dmp

memory/1720-1378-0x00007FFED3BF0000-0x00007FFED3BFA000-memory.dmp

memory/1720-1377-0x00007FFED1BB0000-0x00007FFED1BC1000-memory.dmp

memory/1720-1379-0x00007FFED14F0000-0x00007FFED150E000-memory.dmp

memory/1720-1376-0x00007FFED51D0000-0x00007FFED51DD000-memory.dmp

memory/1720-1374-0x00007FFED2E10000-0x00007FFED2E29000-memory.dmp

memory/1720-1381-0x00007FFECA5E0000-0x00007FFECA63D000-memory.dmp

memory/1720-1380-0x00007FFED5110000-0x00007FFED5125000-memory.dmp

memory/1720-1373-0x00007FFED2E30000-0x00007FFED2E47000-memory.dmp

memory/1720-1385-0x00007FFECB510000-0x00007FFECB52F000-memory.dmp

memory/1720-1387-0x00007FFECA270000-0x00007FFECA3E1000-memory.dmp

memory/1720-1388-0x00007FFED2E10000-0x00007FFED2E29000-memory.dmp

memory/1720-1389-0x00007FFECA5C0000-0x00007FFECA5D8000-memory.dmp

memory/1720-1393-0x00007FFECA5A0000-0x00007FFECA5AB000-memory.dmp

memory/1720-1406-0x00007FFECB510000-0x00007FFECB52F000-memory.dmp

memory/1720-1413-0x00007FFECA4E0000-0x00007FFECA4EC000-memory.dmp

memory/1720-1412-0x00007FFECA4F0000-0x00007FFECA4FC000-memory.dmp

memory/1720-1415-0x00007FFECA4B0000-0x00007FFECA4C2000-memory.dmp

memory/1720-1416-0x00007FFEC9F10000-0x00007FFEC9F1C000-memory.dmp

memory/1720-1419-0x00007FFEC9E10000-0x00007FFEC9ECC000-memory.dmp

memory/1720-1418-0x00007FFECA530000-0x00007FFECA53E000-memory.dmp

memory/1720-1417-0x00007FFEC9ED0000-0x00007FFEC9F04000-memory.dmp

memory/1720-1414-0x00007FFECA4D0000-0x00007FFECA4DD000-memory.dmp

memory/1720-1411-0x00007FFECA500000-0x00007FFECA50B000-memory.dmp

memory/1720-1410-0x00007FFECA5C0000-0x00007FFECA5D8000-memory.dmp

memory/1720-1409-0x00007FFECA510000-0x00007FFECA51B000-memory.dmp

memory/1720-1420-0x00007FFEC9B80000-0x00007FFEC9BAB000-memory.dmp

memory/1720-1408-0x00007FFECA520000-0x00007FFECA52C000-memory.dmp

memory/1720-1407-0x00007FFECA270000-0x00007FFECA3E1000-memory.dmp

memory/1720-1421-0x00007FFEC9860000-0x00007FFEC9B3F000-memory.dmp

memory/1720-1405-0x00007FFECA530000-0x00007FFECA53E000-memory.dmp

memory/1720-1404-0x00007FFECB530000-0x00007FFECB55E000-memory.dmp

memory/1720-1403-0x00007FFECC210000-0x00007FFECC239000-memory.dmp

memory/1720-1402-0x00007FFECA540000-0x00007FFECA54C000-memory.dmp

memory/1720-1401-0x00007FFECA550000-0x00007FFECA55C000-memory.dmp

memory/1720-1400-0x00007FFECA560000-0x00007FFECA56B000-memory.dmp

memory/1720-1399-0x00007FFECA5E0000-0x00007FFECA63D000-memory.dmp

memory/1720-1398-0x00007FFECA570000-0x00007FFECA57C000-memory.dmp

memory/1720-1397-0x00007FFED14F0000-0x00007FFED150E000-memory.dmp

memory/1720-1396-0x00007FFECA580000-0x00007FFECA58B000-memory.dmp

memory/1720-1395-0x00007FFECA590000-0x00007FFECA59C000-memory.dmp

memory/1720-1394-0x00007FFED3BF0000-0x00007FFED3BFA000-memory.dmp

memory/1720-1392-0x00007FFED1BB0000-0x00007FFED1BC1000-memory.dmp

memory/1720-1391-0x00007FFECA5B0000-0x00007FFECA5BB000-memory.dmp

memory/1720-1390-0x00007FFED1510000-0x00007FFED155D000-memory.dmp

memory/1720-1386-0x00007FFED2E30000-0x00007FFED2E47000-memory.dmp

memory/1720-1384-0x00007FFED2E50000-0x00007FFED2E72000-memory.dmp

memory/1720-1383-0x00007FFECB530000-0x00007FFECB55E000-memory.dmp

memory/1720-1382-0x00007FFECC210000-0x00007FFECC239000-memory.dmp

memory/1720-1365-0x00007FFECA640000-0x00007FFECA758000-memory.dmp

memory/1720-1351-0x00007FFED9BD0000-0x00007FFED9BDC000-memory.dmp

memory/1720-1350-0x00007FFED9A90000-0x00007FFED9A9B000-memory.dmp

memory/1720-1349-0x00007FFED9AA0000-0x00007FFED9AAC000-memory.dmp

memory/1720-1348-0x00007FFED9AB0000-0x00007FFED9ABB000-memory.dmp

memory/1720-1347-0x00007FFEDA2E0000-0x00007FFEDA2EB000-memory.dmp

memory/1720-1346-0x00007FFECA760000-0x00007FFECAAD5000-memory.dmp

memory/1720-1345-0x00007FFED9DE0000-0x00007FFED9DF4000-memory.dmp

memory/1720-1344-0x00007FFEDA4F0000-0x00007FFEDA4FB000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI26642\pyexpat.pyd

MD5 9cbd08544dce0712557d8ab3fa0d2d15
SHA1 cff5ea26bd61330146451390d6cecbda1c102c57
SHA256 77813956d86430e1d850989eca1ace8641b7523ecbe1de825bd2fd7094f15f2c
SHA512 e9879b10f26b4205d389de77a978135d285339d971ddae6050cd8453aecf7ed8e39834a685c77aa1beddb8d7d922f4390278c772beb9cd0bfbd7cc8a77c7fc90

C:\Users\Admin\AppData\Local\Temp\_MEI26642\portmidi.dll

MD5 0df0699727e9d2179f7fd85a61c58bdf
SHA1 82397ee85472c355725955257c0da207fa19bf59
SHA256 97a53e8de3f1b2512f0295b5de98fa7a23023a0e4c4008ae534acdba54110c61
SHA512 196e41a34a60de83cb24caa5fc95820fd36371719487350bc2768354edf39eeb6c7860ff3fd9ecf570abb4288523d7ab934e86e85202b9753b135d07180678cd

C:\Users\Admin\AppData\Local\Temp\_MEI26642\libwebp-7.dll

MD5 b0dd211ec05b441767ea7f65a6f87235
SHA1 280f45a676c40bd85ed5541ceb4bafc94d7895f3
SHA256 fc06b8f92e86b848a17eaf7ed93464f54ed1f129a869868a74a75105ff8ce56e
SHA512 eaeb83e46c8ca261e79b3432ec2199f163c44f180eb483d66a71ad530ba488eb4cdbd911633e34696a4ccc035e238bc250a8247f318aa2f0cd9759cad4f90fff

C:\Users\Admin\AppData\Local\Temp\_MEI26642\libtiff-5.dll

MD5 ebad1fa14342d14a6b30e01ebc6d23c1
SHA1 9c4718e98e90f176c57648fa4ed5476f438b80a7
SHA256 4f50820827ac76042752809479c357063fe5653188654a6ba4df639da2fbf3ca
SHA512 91872eaa1f3f45232ab2d753585e650ded24c6cc8cc1d2a476fa98a61210177bd83570c52594b5ad562fc27cb76e034122f16a922c6910e4ed486da1d3c45c24

C:\Users\Admin\AppData\Local\Temp\_MEI26642\libpng16-16.dll

MD5 55009dd953f500022c102cfb3f6a8a6c
SHA1 07af9f4d456ddf86a51da1e4e4c5b54b0cf06ddb
SHA256 20391787cba331cfbe32fbf22f328a0fd48924e944e80de20ba32886bf4b6fd2
SHA512 4423d3ec8fef29782f3d4a21feeac9ba24c9c765d770b2920d47b4fb847a96ff5c793b20373833b4ff8bc3d8fa422159c64beffb78ce5768ed22742740a8c6c6

C:\Users\Admin\AppData\Local\Temp\_MEI26642\libopusfile-0.dll

MD5 2d5274bea7ef82f6158716d392b1be52
SHA1 ce2ff6e211450352eec7417a195b74fbd736eb24
SHA256 6dea07c27c0cc5763347357e10c3b17af318268f0f17c7b165325ce524a0e8d5
SHA512 9973d68b23396b3aa09d2079d18f2c463e807c9c1fdf4b1a5f29d561e8d5e62153e0c7be23b63975ad179b9599ff6b0cf08ebdbe843d194483e7ec3e7aeb232a

C:\Users\Admin\AppData\Local\Temp\_MEI26642\libopus-0.x64.dll

MD5 e56f1b8c782d39fd19b5c9ade735b51b
SHA1 3d1dc7e70a655ba9058958a17efabe76953a00b4
SHA256 fa8715dd0df84fdedbe4aa17763b2ab0db8941fa33421b6d42e25e59c4ae8732
SHA512 b7702e48b20a8991a5c537f5ba22834de8bb4ba55862b75024eace299263963b953606ee29e64d68b438bb0904273c4c20e71f22ccef3f93552c36fb2d1b2c46

C:\Users\Admin\AppData\Local\Temp\_MEI26642\libopus-0.dll

MD5 3fb9d9e8daa2326aad43a5fc5ddab689
SHA1 55523c665414233863356d14452146a760747165
SHA256 fd8de9169ccf53c5968eec0c90e9ff3a66fb451a5bf063868f3e82007106b491
SHA512 f263ea6e0fab84a65fe3a9b6c0fe860919eee828c84b888a5aa52dea540434248d1e810a883a2aff273cd9f22c607db966dd8776e965be6d2cfe1b50a1af1f57

C:\Users\Admin\AppData\Local\Temp\_MEI26642\libogg-0.dll

MD5 0d65168162287df89af79bb9be79f65b
SHA1 3e5af700b8c3e1a558105284ecd21b73b765a6dc
SHA256 2ec2322aec756b795c2e614dab467ef02c3d67d527ad117f905b3ab0968ccf24
SHA512 69af81fd2293c31f456b3c78588bb6a372fe4a449244d74bfe5bfaa3134a0709a685725fa05055cfd261c51a96df4b7ebd8b9e143f0e9312c374e54392f8a2c2

C:\Users\Admin\AppData\Local\Temp\_MEI26642\libmodplug-1.dll

MD5 2bb2e7fa60884113f23dcb4fd266c4a6
SHA1 36bbd1e8f7ee1747c7007a3c297d429500183d73
SHA256 9319bf867ed6007f3c61da139c2ab8b74a4cb68bf56265a101e79396941f6d3b
SHA512 1ddd4b9b9238c1744e0a1fe403f136a1def8df94814b405e7b01dd871b3f22a2afe819a26e08752142f127c3efe4ebae8bfd1bd63563d5eb98b4644426f576b2

C:\Users\Admin\AppData\Local\Temp\_MEI26642\libcrypto-3-x64.dll

MD5 793f7e3828a97b5469ed7b4df3b5ca64
SHA1 2ec4389484217299acb5c32d80f18c0e40993732
SHA256 022944161c1ae25cf667b2e17e97353bbdbf94ff74b823c4061985ae1fcecb6d
SHA512 bfb334508d195cc62ce29485b5b612f18379d462ab27f3efb23ea8443dd4a4e7435704f2dfb8502db5554367bf594a7167c1a7fdbce3749efd1da2b7946916ee

C:\Users\Admin\AppData\Local\Temp\_MEI26642\freetype.dll

MD5 04a9825dc286549ee3fa29e2b06ca944
SHA1 5bed779bf591752bb7aa9428189ec7f3c1137461
SHA256 50249f68b4faf85e7cd8d1220b7626a86bc507af9ae400d08c8e365f9ab97cde
SHA512 0e937e4de6cbc9d40035b94c289c2798c77c44fc1dc7097201f9fab97c7ff9e56113c06c51693f09908283eda92945b36de67351f893d4e3162e67c078cff4ec

C:\Users\Admin\AppData\Local\Temp\_MEI26642\crypto_clipper.json

MD5 4cfbf4863b8ac3eb1a03b2ff736a4b46
SHA1 a903c7029728a211ae4c96efc282e1d552385d00
SHA256 18f9fd3f741e0bead5aaf7712439927e741f9c8dedea779d23cfa34f34aad5a9
SHA512 7eb6a3b415da7ac826675ec1ee578c72742b1b5d5aff6c4cdf1074cf367ef915cf2617f4e796e94be1fc551770d362f43ee55e58c9a6c1724a54a3ec66072968

memory/1720-1280-0x00007FFED9E30000-0x00007FFED9E49000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rzv35qr1.5wn.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/1720-1468-0x00007FFED9E50000-0x00007FFED9E74000-memory.dmp

memory/1720-1476-0x00007FFED9C20000-0x00007FFED9C4E000-memory.dmp

memory/1720-1489-0x00007FFECB510000-0x00007FFECB52F000-memory.dmp

memory/1720-1490-0x00000151A7420000-0x00000151A75FB000-memory.dmp

memory/1720-1488-0x00007FFED2E10000-0x00007FFED2E29000-memory.dmp

memory/1720-1487-0x00007FFED2E30000-0x00007FFED2E47000-memory.dmp

memory/1720-1486-0x00007FFED2E50000-0x00007FFED2E72000-memory.dmp

memory/1720-1485-0x00007FFED2E80000-0x00007FFED2E94000-memory.dmp

memory/1720-1484-0x00007FFED5190000-0x00007FFED51A0000-memory.dmp

memory/1720-1483-0x00007FFED5110000-0x00007FFED5125000-memory.dmp

memory/1720-1482-0x00007FFED9BE0000-0x00007FFED9C16000-memory.dmp

memory/1720-1481-0x00007FFECA640000-0x00007FFECA758000-memory.dmp

memory/1720-1480-0x00007FFED9D60000-0x00007FFED9D86000-memory.dmp

memory/1720-1479-0x00007FFEDA600000-0x00007FFEDA60B000-memory.dmp

memory/1720-1478-0x00007FFEDA650000-0x00007FFEDA65D000-memory.dmp

memory/1720-1475-0x00007FFEDA870000-0x00007FFEDA87D000-memory.dmp

memory/1720-1474-0x00007FFED9C50000-0x00007FFED9C69000-memory.dmp

memory/1720-1473-0x00007FFECA760000-0x00007FFECAAD5000-memory.dmp

memory/1720-1472-0x00007FFED9DE0000-0x00007FFED9DF4000-memory.dmp

memory/1720-1471-0x00007FFED9E00000-0x00007FFED9E2D000-memory.dmp

memory/1720-1470-0x00007FFED9E30000-0x00007FFED9E49000-memory.dmp

memory/1720-1469-0x00007FFEE0AF0000-0x00007FFEE0AFF000-memory.dmp

memory/1720-1467-0x00007FFECAAE0000-0x00007FFECAF4E000-memory.dmp

memory/1720-1477-0x00007FFECA3F0000-0x00007FFECA4A8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI36442\cryptography-43.0.0.dist-info\INSTALLER

MD5 365c9bfeb7d89244f2ce01c1de44cb85
SHA1 d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256 ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512 d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

memory/2820-2831-0x00007FFED51E0000-0x00007FFED51F0000-memory.dmp

memory/2820-2836-0x00000288F4D70000-0x00000288F4DBB000-memory.dmp

memory/2820-2835-0x00007FFED2E80000-0x00007FFED2E99000-memory.dmp

memory/2820-2834-0x00007FFED5110000-0x00007FFED5127000-memory.dmp

memory/2820-2833-0x00007FFED5190000-0x00007FFED51B2000-memory.dmp

memory/2820-2832-0x00007FFED51C0000-0x00007FFED51D4000-memory.dmp

memory/2820-2811-0x00007FFED9DE0000-0x00007FFED9EF8000-memory.dmp

memory/2820-2830-0x00007FFED5810000-0x00007FFED5825000-memory.dmp

memory/2820-2829-0x00007FFED95D0000-0x00007FFED95DC000-memory.dmp

memory/2820-2828-0x00007FFED95E0000-0x00007FFED95F2000-memory.dmp

memory/2820-2827-0x00007FFED9600000-0x00007FFED960D000-memory.dmp

memory/2820-2826-0x00007FFED9A80000-0x00007FFED9A8C000-memory.dmp

memory/2820-2825-0x00007FFED9A90000-0x00007FFED9A9C000-memory.dmp

memory/2820-2824-0x00007FFED9AA0000-0x00007FFED9AAB000-memory.dmp

memory/2820-2823-0x00007FFED9AB0000-0x00007FFED9ABB000-memory.dmp

memory/2820-2822-0x00007FFED9BD0000-0x00007FFED9BDC000-memory.dmp

memory/2820-2821-0x00007FFED9BE0000-0x00007FFED9BEE000-memory.dmp

memory/2820-2820-0x00007FFED9BF0000-0x00007FFED9BFC000-memory.dmp

memory/2820-2819-0x00007FFED9C00000-0x00007FFED9C0C000-memory.dmp

memory/2820-2818-0x00007FFED9C10000-0x00007FFED9C1B000-memory.dmp

memory/2820-2817-0x00007FFED9C20000-0x00007FFED9C2C000-memory.dmp

memory/2820-2816-0x00007FFED9D60000-0x00007FFED9D6B000-memory.dmp

memory/2820-2815-0x00007FFED9D70000-0x00007FFED9D7C000-memory.dmp

memory/2820-2814-0x00007FFED9D80000-0x00007FFED9D8B000-memory.dmp

memory/2820-2813-0x00007FFEDA2E0000-0x00007FFEDA2EB000-memory.dmp

memory/2820-2812-0x00007FFED9C30000-0x00007FFED9C66000-memory.dmp

memory/2820-2810-0x00007FFED9F00000-0x00007FFED9F26000-memory.dmp

memory/2820-2809-0x00007FFEDA4F0000-0x00007FFEDA4FB000-memory.dmp

memory/2820-2807-0x00007FFED9F30000-0x00007FFED9FE8000-memory.dmp

memory/2820-2806-0x00007FFED9FF0000-0x00007FFEDA01E000-memory.dmp

memory/2820-2803-0x00007FFECA760000-0x00007FFECAAD5000-memory.dmp

memory/2820-2802-0x00007FFEDA040000-0x00007FFEDA054000-memory.dmp

memory/2820-2801-0x00007FFEDA060000-0x00007FFEDA08D000-memory.dmp

memory/2820-2799-0x00007FFEDA870000-0x00007FFEDA87F000-memory.dmp

memory/2820-2798-0x00007FFEDA090000-0x00007FFEDA0B4000-memory.dmp

memory/2820-2797-0x00007FFECAAE0000-0x00007FFECAF4E000-memory.dmp

memory/2820-2808-0x00007FFEDA600000-0x00007FFEDA60D000-memory.dmp

memory/2820-2805-0x00007FFEDA650000-0x00007FFEDA65D000-memory.dmp

memory/2820-2804-0x00007FFEDA020000-0x00007FFEDA039000-memory.dmp

memory/2820-2800-0x00007FFEDA310000-0x00007FFEDA329000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

MD5 d751713988987e9331980363e24189ce
SHA1 97d170e1550eee4afc0af065b78cda302a97674c
SHA256 4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512 b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

MD5 f0a6555c12c1a9ec9baae0aaac20df97
SHA1 8a0fbc8560f363710d64540f2494cb2ade09c8ee
SHA256 fd41b604e8d45ca45bc3a1603f953d7b97ac1f2c65e07797dfb36267fffc3b77
SHA512 8a9e3c877c5eb5a2cb745a641ab4d3af99373f89e158a38ac04dfa58ee2ada30967f2b816caa6da2adfeed46a3499fa2a47bdce129016c8e00e29a54aaed662a

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 38ff50b07d4ef7d90085e2793c6a79da
SHA1 79e2df64dbf88f69eac41e4e95d1f520bf7fc91d
SHA256 21c585458469cf15621754d611bebfec090d4ab83db9639ad02efadea6d2b5f1
SHA512 c3ccdf5c88fdc786dbed76bdf4a6abc53639a0e53e69138018dab65f98c72c8dab2614507130c73d5de77484ffb489f0b8ded8c631f8fcf388bc728c2dd086d0

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 5efe1f0e48cb1c5814ec462a94cccc8d
SHA1 14f39b24a30dff38e8fb04b825091114cb1968de
SHA256 b5641d7b4ff542fe6f93f4e6cf8f8e72f8fc70cb03cca91a4c380afbd340cf25
SHA512 b887f809a1c557496d38a5620340c381a7c71fdcc068e96e7f190416a30abd0a307066a901e9c05412c68aaeb52c5090d8eac583c8550fdbc8353c32930ab141

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 51538ed5154d019a6aed097445b89d46
SHA1 3414af9a00fca795a4d23ee717d27475667b70d1
SHA256 37cc73e6b047d42941222ba4144357c322934ce4276cb47e86587e9e4384cf6e
SHA512 c890daedbe0679bce9e730d354eda99292b18aa3848ca0157f738646c320c7c10cce970595bd3f22e143a03245235dfef5532a5d94d2436da47641874eb60523

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

MD5 0219d72555a997fc9d1ae664f9b5e1d2
SHA1 18554ffbe23a76ef3ade579e42f4a780bcdbc061
SHA256 ca2b236996a73a7b195019e10e6f73b54cd6d4249de0dca00df28f17ff44c656
SHA512 99008b2a59cc29cbda75c87b00cbb92d019675d748a78af62aef1e6ed9b8aa5f09e865e9a8618f6955ef76169deecdd782f04454211100805f418e8a375272d4

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 fb44b4476f1d75189fe55097cdd849e1
SHA1 6598b11760a2e930d67af1fc32f3fe3473a6d8ab
SHA256 f8bd326d50993a74f05393c2b47d1f6f128212f1a5436e5d33cd4f7a54e1963f
SHA512 914d4bf39cd9294a6ed53fda29078ca8d8e87ad5c9d6f504c3eaf8cd220a5ebc1a3c62c85b240118a1a100b4bfa3d542aefa1aa2cbc41c6bf10b0b08c5b6064b

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 96a382f452958928764d458526619838
SHA1 40ddbdc90605ee55758a277f67741b483b8be0ea
SHA256 763d2fd0827d3482994e51cdef86a11fa71d3d43caef62d07d04799f8f169730
SHA512 d34cbca0149e01933ea9a7b0c8747aae93ccaf90b0a55ef7a52ce57e7d212499f4da8faaa3f3081185211300e143b1d211d9db0bebc1ef5e28d2cb777f5c94f0

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 a7b0861e2f8f32c60decb48b5199798f
SHA1 c8f7d887d53857e512a1c31a9e36fc16ef16bfd3
SHA256 03b0f78ee1d51cba8f0e697f5aca0a45d90c9a89d263ccae6c1ec0be32f3c765
SHA512 392bf75dbc70f7a3692d4dffd763fb4f4cf3ca5a24dd4757617cc3432a2ef7f8321ec368fd090f3c1e2a3847314bb8685946a010b52ccbfe27c6ebf21b20ef18

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 8e3bcfcc01b5a21eb192fd1877aa6c1e
SHA1 ac41c8f3afe2f16c25631d9adf877b549737affd
SHA256 15006c6a717bdf23b9d1f2e868720519c1c5a73cecdfa3055f51cd5b77c0eedb
SHA512 12bde163bf4c1901d2c616eaa9846d64ad1698e1ef10023c9375a979e4c64a068dc59b4fbbedb45ae24017ae937b8206f2796c9b1ca4edb4ed96293bfc1f5ec0

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 c58efe387a9e7bbf35225ece22cb6c23
SHA1 9caa9d998bf2798f391c6941c05832c522f0c803
SHA256 2158a8fe06239389f9ff15cd46fdb14ae492b666188cade494e39c999f5a3d2a
SHA512 1388b758b0f55709b3d59eb8d6eed02ce8b6db5627c8898a99d7b43a9f7374b6d6a524c9b8b59446057f0064027156856358b19d7b116e02f08cbcb118373055

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

MD5 8572a3df621885ee142fd012ad125ef1
SHA1 2c5c8a953a5dbc62a26586c2c99fb39fe273a556
SHA256 68435ac532d9100e08a1b9899254d057e6e31e7d884d7a933cddc5d0039b480d
SHA512 3117c21e86611264d251506842c50d95b1449803c22dba3124d3364f2747b39bcbe78fa869c52d99647d55fca8e0acd1167a8398f298324e1b51d0eba60da85a

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 fd8e62b27721fbb0e85a3a24ab3d2250
SHA1 638d94ae771df6b8ff0e44c60f27f47c81eba27a
SHA256 9c591fc41b6c673b831b5b51e97e4c0060fbfcdc24ea40f4596050832e257062
SHA512 84531e5e887fd4ef8896fbe56d330fb03f09d311e29230db5bbada7109075db0d15acff8c51ab634707df588d22ba824baa2f2bf892266f4d8f5ea6ffa0c20d8

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.dat

MD5 ebd1e0c475994371b3998462615f0d05
SHA1 14e355cb59a4e518018b776164c6d0217aca50e8
SHA256 6982055c717bbdaed4aeec95fd9209e1f933093cf5419bc09194366ee80b0541
SHA512 7aa0bc09e0f291418fe3b6683c2e6e83781a2d96af1d36fd47162a132cfb1fe0051135fe401c6f953c85948974aa79343fb88a0d40ed31be7c60249ae21a3a32

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 18a79cab7d6f123ae835b66a7bf2959a
SHA1 bf298584b243d7dbb13b05593908608d131f0e06
SHA256 c2b3a1944d4f586e234d05f76997f9802712dc0ae9aecc450e134a5fb334e047
SHA512 81d34c940b0cf4a6eb15127d2077ce05dd6ce022b98d6287f31303051e7ee184e04f081be222b0741534e1d598c7bf53752ffe005fec2b2c57021ca0ac4e204c

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

MD5 3731c40b0275e7000c0194617e0fea27
SHA1 1de88ac943c7132ea47aade559a8b56c1a40bea5
SHA256 25801b5c387e303d5999db76de6c5378de2474a34a6cc9fd6c102987e4590de8
SHA512 ffefa0c508e6c210033b0fabb3648f75c7665122adb0053a895cf9c97fc31038a82675ac0c628630c0d77b4a7bcfe415b22ef5b6e7f6205fcbb77de15bb86fe7

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 8e027aec41884b987312fed3737b749d
SHA1 26e1e92459227f979c6db2a9dfc13b0752499079
SHA256 99e2887fe4571b12fa354ac41b0938004e99a7c2a9e691478c99bc0dd9d5d241
SHA512 d7ea901575a3c4551da47dc16fca228df45e642346b41d3e5960bf526130e99aa791fe51d3970ae014626d9ebdadfd9d4bec328615206e4a2ba4b4f8f546e843

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

MD5 0f4d6c11a4a4f593197afd219f1d6446
SHA1 a893e9d0136110a7c18d4158670f281c997a8981
SHA256 fc8237643eda7df4a2c96d9fb1db482e1ecb8ef34b8abed5134d7f8962bb1808
SHA512 b436c35504e8d3a869100edaa2d7146de8f8a0bbc0d6016647b47470ba95552733d3bd0ba6cc9759ce873291028ba6632af34557d22cd2f9a8f0eed647f3afa9

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 a312425b7d4dda7b422bbb1a2ea4410b
SHA1 cd70e4c21f0f6f937ed50a2dd082b020171147bc
SHA256 349e8a0f171f648e6901d078c607ed21494c3b463a0de43589ce49878052f79e
SHA512 ad2cb1ed8249577f01d3519fdf27451176ac5b170884cf52fab50b6c5a489192bb69c42da38d22690391385b9495379113c23288428378c3a00853b52bdac4ba

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\155289e7-cc2b-4599-83f6-6fe6a40fa6d1.tmp

MD5 64bccc0acd1b835f681d4c5471b455aa
SHA1 5203fe721e27e089ca44a44ff7aac176eb2d188b
SHA256 bc382c4e2c66edd31fe0782deef08717fd063eb43bb383fb85762bbe0cc7db79
SHA512 aaf868b8d4fa6c91f39e7887a85e5004e98eda711e01a9d240198b855f9080a12296557b4f91978f1d3302a0c775bc637446a6c7d0ff6535986d3fe27d930134