Malware Analysis Report

2025-06-15 20:18

Sample ID 241222-zt4qnsynhw
Target superdoopercoolthking.exe
SHA256 decb0b47bdccfb1c283b566a8c5d657c0dcbf9767ef26eb28aaeefb3d0d2e554
Tags
pyinstaller pysilon upx evasion execution persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

decb0b47bdccfb1c283b566a8c5d657c0dcbf9767ef26eb28aaeefb3d0d2e554

Threat Level: Known bad

The file superdoopercoolthking.exe was found to be: Known bad.

Malicious Activity Summary

pyinstaller pysilon upx evasion execution persistence

Detect Pysilon

Pysilon family

Enumerates VirtualBox DLL files

Command and Scripting Interpreter: PowerShell

Sets file to hidden

Loads dropped DLL

Executes dropped EXE

Adds Run key to start application

Legitimate hosting services abused for malware hosting/C2

UPX packed file

Detects Pyinstaller

Unsigned PE

Suspicious behavior: GetForegroundWindowSpam

Views/modifies file attributes

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

Kills process with taskkill

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-22 21:01

Signatures

Detect Pysilon

Description Indicator Process Target
N/A N/A N/A N/A

Pysilon family

pysilon

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-22 21:01

Reported

2024-12-22 21:04

Platform

win7-20240708-en

Max time kernel

120s

Max time network

124s

Command Line

"C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Processes

C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe

"C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe"

C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe

"C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe"

Network

N/A

Files

C:\Users\Admin\AppData\Local\Temp\_MEI22002\python311.dll

MD5 87b5d21226d74f069b5ae8fb74743236
SHA1 153651a542db095d0f9088a97351b90d02b307ac
SHA256 3cac88119657daef7f79844aeb9da79b45c1f3bb2ea3468b0d4ed26067852194
SHA512 788bb26b3f4ce99a2b49eef2742972fe843bdd97d361a6e67237f29376648ea6f874f1f6ba6dd53c74ef51a29e650a02fb99dfc30b5badfa9d2e05491f81d7d6

memory/1992-1265-0x000007FEF5470000-0x000007FEF5A58000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-12-22 21:01

Reported

2024-12-22 21:04

Platform

win10v2004-20241007-en

Max time kernel

141s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe"

Signatures

Enumerates VirtualBox DLL files

Description Indicator Process Target
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\cool argon\cool.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\cool argon\cool.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\cool argon\cool.exe N/A
N/A N/A C:\Users\Admin\cool argon\cool.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cool = "C:\\Users\\Admin\\cool argon\\cool.exe" C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\cool argon\cool.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\cool argon\cool.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 33 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 34 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 35 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 36 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\cool argon\cool.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 392 wrote to memory of 4728 N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe
PID 392 wrote to memory of 4728 N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe
PID 4728 wrote to memory of 5108 N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe C:\Windows\system32\cmd.exe
PID 4728 wrote to memory of 5108 N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe C:\Windows\system32\cmd.exe
PID 4728 wrote to memory of 680 N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4728 wrote to memory of 680 N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4728 wrote to memory of 3716 N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe C:\Windows\system32\cmd.exe
PID 4728 wrote to memory of 3716 N/A C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe C:\Windows\system32\cmd.exe
PID 3716 wrote to memory of 604 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 3716 wrote to memory of 604 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 3716 wrote to memory of 4308 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\cool argon\cool.exe
PID 3716 wrote to memory of 4308 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\cool argon\cool.exe
PID 3716 wrote to memory of 4388 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 3716 wrote to memory of 4388 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 4308 wrote to memory of 1624 N/A C:\Users\Admin\cool argon\cool.exe C:\Users\Admin\cool argon\cool.exe
PID 4308 wrote to memory of 1624 N/A C:\Users\Admin\cool argon\cool.exe C:\Users\Admin\cool argon\cool.exe
PID 1624 wrote to memory of 3060 N/A C:\Users\Admin\cool argon\cool.exe C:\Windows\system32\cmd.exe
PID 1624 wrote to memory of 3060 N/A C:\Users\Admin\cool argon\cool.exe C:\Windows\system32\cmd.exe
PID 1624 wrote to memory of 4084 N/A C:\Users\Admin\cool argon\cool.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1624 wrote to memory of 4084 N/A C:\Users\Admin\cool argon\cool.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1624 wrote to memory of 3612 N/A C:\Users\Admin\cool argon\cool.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1624 wrote to memory of 3612 N/A C:\Users\Admin\cool argon\cool.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe

"C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe"

C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe

"C:\Users\Admin\AppData\Local\Temp\superdoopercoolthking.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x4c0 0x320

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\cool argon\""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\cool argon\activate.bat""

C:\Windows\system32\attrib.exe

attrib +s +h .

C:\Users\Admin\cool argon\cool.exe

"cool.exe"

C:\Windows\system32\taskkill.exe

taskkill /f /im "superdoopercoolthking.exe"

C:\Users\Admin\cool argon\cool.exe

"cool.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\cool argon\""

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell (Get-CimInstance Win32_ComputerSystemProduct).UUID

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 73.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
N/A 127.0.0.1:54163 tcp
US 8.8.8.8:53 discord.com udp
US 162.159.136.232:443 discord.com tcp
US 8.8.8.8:53 gateway.discord.gg udp
US 162.159.136.234:443 gateway.discord.gg tcp
US 8.8.8.8:53 232.136.159.162.in-addr.arpa udp
US 8.8.8.8:53 234.136.159.162.in-addr.arpa udp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 56.163.245.4.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 gateway-us-east1-c.discord.gg udp
US 162.159.136.234:443 gateway-us-east1-c.discord.gg tcp
US 162.159.134.234:443 gateway-us-east1-c.discord.gg tcp
US 8.8.8.8:53 234.134.159.162.in-addr.arpa udp
US 8.8.8.8:53 182.129.81.91.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI3922\python311.dll

MD5 87b5d21226d74f069b5ae8fb74743236
SHA1 153651a542db095d0f9088a97351b90d02b307ac
SHA256 3cac88119657daef7f79844aeb9da79b45c1f3bb2ea3468b0d4ed26067852194
SHA512 788bb26b3f4ce99a2b49eef2742972fe843bdd97d361a6e67237f29376648ea6f874f1f6ba6dd53c74ef51a29e650a02fb99dfc30b5badfa9d2e05491f81d7d6

C:\Users\Admin\AppData\Local\Temp\_MEI3922\VCRUNTIME140.dll

MD5 f12681a472b9dd04a812e16096514974
SHA1 6fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256 d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA512 7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

memory/4728-1267-0x00007FFD566F0000-0x00007FFD56CD8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI3922\base_library.zip

MD5 2a138e2ee499d3ba2fc4afaef93b7caa
SHA1 508c733341845e94fce7c24b901fc683108df2a8
SHA256 130e506ead01b91b60d6d56072c468aeb5457dd0f2ecd6ce17dfcbb7d51a1f8c
SHA512 1f61a0fda5676e8ed8d10dfee78267f6d785f9c131f5caf2dd984e18ca9e5866b7658ab7edb2ffd74920a40ffea5cd55c0419f5e9ee57a043105e729e10d820b

C:\Users\Admin\AppData\Local\Temp\_MEI3922\_ctypes.pyd

MD5 e7ec734581f37a065e54b55515222897
SHA1 9205e3030ea43027cba202b4c968447927d3dc0d
SHA256 9e619adf436228c1c87e7909ca58575a02ef069d71045785b102e2a0f833b6a3
SHA512 281a16075a10ab4465ff1ab49c5639e982961b5029dc36f4b9657f32b9c29ff1bd39c2d6a3f793d7f93fd10802f5d1356bee9e54fa6eb67780a6275094e4fef3

C:\Users\Admin\AppData\Local\Temp\_MEI3922\python3.DLL

MD5 34e49bb1dfddf6037f0001d9aefe7d61
SHA1 a25a39dca11cdc195c9ecd49e95657a3e4fe3215
SHA256 4055d1b9e553b78c244143ab6b48151604003b39a9bf54879dee9175455c1281
SHA512 edb715654baaf499cf788bcacd5657adcf9f20b37b02671abe71bda334629344415ed3a7e95cb51164e66a7aa3ed4bf84acb05649ccd55e3f64036f3178b7856

memory/4728-1275-0x00007FFD66EC0000-0x00007FFD66EE4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI3922\libffi-8.dll

MD5 77199701fe2d585080e44c70ea5aed4c
SHA1 34c8b0ce03a945351e30fb704a00d5257e2a6132
SHA256 4eb41bcf5e54017c4d8c6a7184f4633d9e6c10ca8f52ad21e3b752edd745d4ee
SHA512 d325f517a3eb831f3f5853c5471295244716a666507aa4e4b262e0842f1bfad0c9648a6711fbce514193e411cfcdbb9afe86764e740355cd06895dfcc623fe34

memory/4728-1277-0x00007FFD68810000-0x00007FFD6881F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI3922\_bz2.pyd

MD5 c33370fc6631725aec3102b955b5e4bf
SHA1 0fce43642e54cd9db1eb48bbfd7661b8a4613e0d
SHA256 6c41a618b4dec812f5cd434375f33052daada9f49c6d472e82bdec27c407cfc5
SHA512 1de939ccb2b6349eaefcf12f37fb00b2b5dafff07930d52bfededcdfe6a234c0da75030596f544adfea09c786dc576fc5a88056ec614d2059a1a9e182925a021

memory/4728-1280-0x00007FFD66DA0000-0x00007FFD66DB9000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI3922\_lzma.pyd

MD5 49a6a6127ad0a70a2d60f193254ba710
SHA1 eb9f1f5a0b264d6c2c477562b9331a798b9a1909
SHA256 4ad51dac78f9192831ee9c6959ad3d67e0f66869bded3a91688b08c4ff2103f7
SHA512 e5064d0536361fd193b1855fcb4173cace51094d8c8827dfca893d49734200156847987124ded14d75aa0c61f1204cc00eaf4ee81d84406e17ad216bf17003ca

memory/4728-1283-0x00007FFD66890000-0x00007FFD668BD000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI3922\libcrypto-1_1.dll

MD5 8e7025186c1c6f3f61198c027ff38627
SHA1 79c6f11358c38bda0c12ee1e3ab90a21f4651fa1
SHA256 f393f54886674e42bb7667087c92af67bd46e542c44ddff11c5061481261c90e
SHA512 4bbbf7d0a51aec361779d7735c6a91f1bdd468da0aaa3626c3cb52128c998d6454be8c473c8743172ffcea9dc66403a5a81ff5535d9baf87fa6ab990a35add41

memory/4728-1323-0x00007FFD66870000-0x00007FFD66884000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI3922\_hashlib.pyd

MD5 d27d3f54914b9b3b4dbf947a216b0e11
SHA1 36a4905e2ca457f241d6f2fc61d11c2a7986e802
SHA256 ed5433134675839cf0ac3d55006e87c3e8b74bb622168d83fa7e00c9dec1b844
SHA512 e3bf3df3c0202eb19830985ae5e9f6d4d03bedbc0b8371dcefa6d08bf2ce47dce211957c9c36bee8c57889d29084a08ff3d3fe2cd643e3420ca0c030585adef9

C:\Users\Admin\AppData\Local\Temp\_MEI3922\_uuid.pyd

MD5 4c8ffc5c3b8bb6e969e8c80a132a1cf7
SHA1 fef1d1a9b17571fb885aa7f224cc9473b0b9adfe
SHA256 b73fd8206c709f352dd26850d181a8ba8b14bad3b3494f61038f45044a3a2d85
SHA512 6eca26f968f124f0bac60dd2a184be56cee4f8e74e4fef20c5f3e920d50651f7772d49ed43d4024da6aed11b25be0018ccdb87506ac96e3346ce2d72c4cb223e

C:\Users\Admin\AppData\Local\Temp\_MEI3922\_tkinter.pyd

MD5 a7d7c6f515f5b49b1204d1376f7621cc
SHA1 42000eee9d23ac678103ad3067edfccd5043219f
SHA256 3b816042f0c47279b39a2d04347e115404fffbb01de35134fd7db279f55296bc
SHA512 f54a3d79ac6a1f0bf88562c7cd004055d29f6bc05beb408e856fc5305f59f061b7a17556e008a549dd12aa9399c99e7fe2321cd5ec7324ab7ce3151b0454e9b8

C:\Users\Admin\AppData\Local\Temp\_MEI3922\_ssl.pyd

MD5 e77ee0cd7cab90dabbaea0f8abd7e1c8
SHA1 8b7f712eac536e9932c2bfde828624c34870e4d5
SHA256 c8359a4e0991f6604666004bac39b9c290195d64af47b263a85f663d89822b11
SHA512 4f0461b803d214e798be061829103fe20d12a14d88e365c186b3081b695138ae68b64083626431c9105d5609f36193fd8891f6e8968392b42709e6c198bd9c2f

C:\Users\Admin\AppData\Local\Temp\_MEI3922\_sqlite3.pyd

MD5 0b71fb4c0dba8beca2b950b5d0df24e9
SHA1 af710f7604da0777b35fde62115214f029e0db26
SHA256 8ecf7eabe204218b672660e52b539040183cf346ca630ff3de552a22111ecb3d
SHA512 784ff22dd62b398378bba276b386280d7e0930bf5611a5ca7fcdf894c352be5aaeabec2f419092cfa17791f61b725f37b44bb6e861dba2e5322b87078952c660

C:\Users\Admin\AppData\Local\Temp\_MEI3922\_socket.pyd

MD5 38c567e91d5bd0ea66f57528319e6487
SHA1 98029c6c35886b9ab94c5bbaa4fbb54de9f45dc2
SHA256 502212dbed204b73f8b18b9b13c0ea158c9dd2cfffae2d7cafedf7b042264fbb
SHA512 d2f03faf7faaa1b82dd14130a85b203e86de96777209d47ec459c5a1efbbbd0ac6754d53ff9618744ad57c3b800b6fa6f8850c716dacce3828264eef265543b0

C:\Users\Admin\AppData\Local\Temp\_MEI3922\_queue.pyd

MD5 3b901ff0137dc2460d2f90b0a43a9482
SHA1 bd89b85b8ca525b9370fc105b5009e45ab95131a
SHA256 9982fad71df27eaeaac9521e25a300dfe5810aa723fafd56667b09a9bef26594
SHA512 c1fa7d0b4af3421f288cb2773fa35bbe6efe86160de48787da998f155f6880df535f075bbec531a5c5a9c210c239d4e926d86b486bc68f41a7e1ef97ac095dcd

C:\Users\Admin\AppData\Local\Temp\_MEI3922\_overlapped.pyd

MD5 96d75944d280f39eb0f8e435511f3222
SHA1 0d74eefaf62c80c969bfe2f5e32fc269073527f3
SHA256 bfac2d1b1c5b948f6cd70de2e2edbe85f535ace879dbbaa04a71065ea11ef280
SHA512 724be702596604d173a542526b2049f268f611c204f03ef642ccf5e946441973704dca6e601bc5fd6dc3cc9a35b8cfd392571fe3228c59e277259097f53b2bf3

C:\Users\Admin\AppData\Local\Temp\_MEI3922\_multiprocessing.pyd

MD5 b5979368da73ffe9213dd49c0e5d6270
SHA1 5cf6ab2e801899cde24f3b356f8c1bff9d935528
SHA256 020602164b9891cb1c304d9f70dd8083c7e1a9a42caa9cfd67a5bbc0728029b9
SHA512 191823e56c4a3ea8bd211745111861d140899263ebed9b1988d2be37e1ba073195b55548266d6c536793edf49ef82b19064be96992b7bea9171424e789c83352

C:\Users\Admin\AppData\Local\Temp\_MEI3922\_elementtree.pyd

MD5 dda8f0cc660c5e8170e37f37394f53ad
SHA1 6fea7006e44d0ee320499034e61f0cd99247abda
SHA256 58fc4868d87f7e05a387fb39646110307b993757b3e23e52d4489e7cea653dcc
SHA512 13cda3936c3b7eace74aed66282a13aa3d63e9da9b761a7fc8d6d0f215b61fc44ef4c4d60bbb0cb8d52689ed1ac05993965f5498da41ee95d6299d4f9a4bf4f5

C:\Users\Admin\AppData\Local\Temp\_MEI3922\_decimal.pyd

MD5 c21d61753b2a62fe70311aaa50e75a64
SHA1 39cc382ae3fbcb6b80974ece0e020cdcbec8f57a
SHA256 0ef0b881c15d88a443a1bfc898d0011dab50500ee4a86e0f35c3076ed70cce49
SHA512 059c7c7f35c939ab615b4dc1d3e9da69a66b0ed4a30931115971898c63f24ff960bb544f2ff9db7ce990c36a4d1e6307864d0f1ec5fbf354983473268c9500e4

C:\Users\Admin\AppData\Local\Temp\_MEI3922\_cffi_backend.cp311-win_amd64.pyd

MD5 c4a0ceacd79d2c06956d24bf1c028a35
SHA1 1dfc5c777435a46a69c984411d4dfb717b47c537
SHA256 1ec4cd20853191e91e36556c6fe1a8bb14d162ee9904acc897cd8f694089f0e7
SHA512 da57381043a500a5bc826215d9c253e22139dd3e9e28a870b03d2d7d486aa8eb1a78a45ba45ee9c86b3a9bb264f20a9a776e5e3ab1e921ea6d0747275410746d

C:\Users\Admin\AppData\Local\Temp\_MEI3922\_asyncio.pyd

MD5 e6307d02076151c6fc9b78b1f346068f
SHA1 336cb5b3fc88ff4d9cc021f858ff33b0eb96c881
SHA256 fdb2a227d646b420de9877bb569b96369b6175e322f6ef81bc3f372eed08c10b
SHA512 7a22e2c293a067502a0d1e4ccc9fcb81dd7bd7faf56a1fd4a6cebc56c5ce4e8bf6c7157e19fe779ed70722d559da61ab5ca1f9b1e1b3df8a2b83728fbac2564c

C:\Users\Admin\AppData\Local\Temp\_MEI3922\zlib1.dll

MD5 ee06185c239216ad4c70f74e7c011aa6
SHA1 40e66b92ff38c9b1216511d5b1119fe9da6c2703
SHA256 0391066f3e6385a9c0fe7218c38f7bd0b3e0da0f15a98ebb07f1ac38d6175466
SHA512 baae562a53d491e19dbf7ee2cff4c13d42de6833036bfdaed9ed441bcbf004b68e4088bd453b7413d60faaf1b334aee71241ba468437d49050b8ccfa9232425d

C:\Users\Admin\AppData\Local\Temp\_MEI3922\VCRUNTIME140_1.dll

MD5 75e78e4bf561031d39f86143753400ff
SHA1 324c2a99e39f8992459495182677e91656a05206
SHA256 1758085a61527b427c4380f0c976d29a8bee889f2ac480c356a3f166433bf70e
SHA512 ce4daf46bce44a89d21308c63e2de8b757a23be2630360209c4a25eb13f1f66a04fbb0a124761a33bbf34496f2f2a02b8df159b4b62f1b6241e1dbfb0e5d9756

C:\Users\Admin\AppData\Local\Temp\_MEI3922\unicodedata.pyd

MD5 5c05df2afd90a54d6378ff869d774b33
SHA1 38e2d685cd131ef1fff235ed180016c083bf2965
SHA256 0f631b1f12c8b0aded13ee5a50ff11eb2bcf9c47b535270a8a88fdfee4709ac6
SHA512 7d4712cdf0d27f66f33070ec4d1b4e6c51d3857edf01c4db94ce71eb8ed5b7780f5e3e05593e53d1dd51bc00d14dacdb234f02d391569b5e7ec136c00c10b145

C:\Users\Admin\AppData\Local\Temp\_MEI3922\tk86t.dll

MD5 7d85f7480f2d8389f562723090be1370
SHA1 edfa05dc669a8486977e983173ec61cc5097bbb0
SHA256 aaeda7b65e1e33c74a807109360435a6b63a2994243c437e0cdaa69d2b8c6ac5
SHA512 a886475aeea6c4003dd35e518a0833574742b62cdbbbe5b098a5c0f74e89795ebddac31c4107dae6edee8fc476addaa34253af560d33bed8b9df9192c3e7f084

C:\Users\Admin\AppData\Local\Temp\_MEI3922\tcl86t.dll

MD5 755bec8838059147b46f8e297d05fba2
SHA1 9ff0665cddcf1eb7ff8de015b10cc9fcceb49753
SHA256 744a13c384e136f373f9dc7f7c2eb2536591ec89304e3fa064cac0f0bf135130
SHA512 e61dc700975d28b2257da99b81d135aa7d284c6084877fe81b3cc7b42ac180728f79f4c1663e375680a26f5194ab641c4a40e09f8dbdeb99e1dfa1a57d6f9b34

C:\Users\Admin\AppData\Local\Temp\_MEI3922\sqlite3.dll

MD5 aa2a7bd0e84498719405008b996a38ec
SHA1 0cb0962b02324067a715559c64fcbe3c1e798d03
SHA256 cacbebf5a19a14d3aaf59fd71a79ed38638c61f80994a292f16193d52d91832a
SHA512 d39f093eb5ad7ed489e10f6db405eaf0d0844a5e3eed1deff4202f1cf316293535e46d87d5aff1d210bacf53a65a08c397eacc919787da8133614951d77d85e6

C:\Users\Admin\AppData\Local\Temp\_MEI3922\select.pyd

MD5 5159aab3342e8e811454849c5543d0fe
SHA1 992b1aa55aa3a9ddc12857ec576c3d85ba5176d8
SHA256 2051c44e5704b8800145905058425b9fd829c1be6106ef632ef78fd574f513c1
SHA512 36437f1f4b6431c35074c13f9c791be5e041a8c4861878c254115398f5f3249afef1548a554eb7b06fc9de5271d6a98a0c026b951fa04ad312aa3f56b20774d0

C:\Users\Admin\AppData\Local\Temp\_MEI3922\SDL2_ttf.dll

MD5 eb0ce62f775f8bd6209bde245a8d0b93
SHA1 5a5d039e0c2a9d763bb65082e09f64c8f3696a71
SHA256 74591aab94bb87fc9a2c45264930439bbc0d1525bf2571025cd9804e5a1cd11a
SHA512 34993240f14a89179ac95c461353b102ea74e4180f52c206250bb42c4c8427a019ea804b09a6903674ac00ab2a3c4c686a86334e483110e79733696aa17f4eb6

C:\Users\Admin\AppData\Local\Temp\_MEI3922\SDL2_mixer.dll

MD5 b7b45f61e3bb00ccd4ca92b2a003e3a3
SHA1 5018a7c95dc6d01ba6e3a7e77dd26c2c74fd69bc
SHA256 1327f84e3509f3ccefeef1c12578faf04e9921c145233687710253bf903ba095
SHA512 d3449019824124f3edbda57b3b578713e9c9915e173d31566cd8e4d18f307ac0f710250fe6a906dd53e748db14bfa76ec1b58a6aef7d074c913679a47c5fdbe7

C:\Users\Admin\AppData\Local\Temp\_MEI3922\SDL2_image.dll

MD5 25e2a737dcda9b99666da75e945227ea
SHA1 d38e086a6a0bacbce095db79411c50739f3acea4
SHA256 22b27380d4f1f217f0e5d5c767e5c244256386cd9d87f8ddf303baaf9239fc4c
SHA512 63de988387047c17fd028a894465286fd8f6f8bd3a1321b104c0ceb5473e3e0b923153b4999143efbdd28684329a33a5b468e43f25214037f6cddd4d1884adb8

C:\Users\Admin\AppData\Local\Temp\_MEI3922\SDL2.dll

MD5 ec3c1d17b379968a4890be9eaab73548
SHA1 7dbc6acee3b9860b46c0290a9b94a344d1927578
SHA256 aaa11e97c3621ed680ff2388b91acb394173b96a6e8ffbf3b656079cd00a0b9f
SHA512 06a7880ec80174b48156acd6614ab42fb4422cd89c62d11a7723a3c872f213bfc6c1006df8bdc918bb79009943d2b65c6a5c5e89ad824d1a940ddd41b88a1edb

C:\Users\Admin\AppData\Local\Temp\_MEI3922\pyexpat.pyd

MD5 a655fa42e31e30cf60f452b70c01a1a4
SHA1 e38b435347a65d39dd2ff8518b75070e6038fb47
SHA256 83feb05e74d002110bf8d032c3ad2ffb636ae0ba4300e1ba84ce4add8f0554ec
SHA512 e54b38011ea94565ddf88120b8a3718b9cfcb79ca4b4900da1f9338b59795162534dbd2d5bfd67a81d9a29a6675ffdb2dc8772f583ee5bf2de547136334c8831

C:\Users\Admin\AppData\Local\Temp\_MEI3922\portmidi.dll

MD5 0df0699727e9d2179f7fd85a61c58bdf
SHA1 82397ee85472c355725955257c0da207fa19bf59
SHA256 97a53e8de3f1b2512f0295b5de98fa7a23023a0e4c4008ae534acdba54110c61
SHA512 196e41a34a60de83cb24caa5fc95820fd36371719487350bc2768354edf39eeb6c7860ff3fd9ecf570abb4288523d7ab934e86e85202b9753b135d07180678cd

C:\Users\Admin\AppData\Local\Temp\_MEI3922\libwebp-7.dll

MD5 b0dd211ec05b441767ea7f65a6f87235
SHA1 280f45a676c40bd85ed5541ceb4bafc94d7895f3
SHA256 fc06b8f92e86b848a17eaf7ed93464f54ed1f129a869868a74a75105ff8ce56e
SHA512 eaeb83e46c8ca261e79b3432ec2199f163c44f180eb483d66a71ad530ba488eb4cdbd911633e34696a4ccc035e238bc250a8247f318aa2f0cd9759cad4f90fff

C:\Users\Admin\AppData\Local\Temp\_MEI3922\libtiff-5.dll

MD5 ebad1fa14342d14a6b30e01ebc6d23c1
SHA1 9c4718e98e90f176c57648fa4ed5476f438b80a7
SHA256 4f50820827ac76042752809479c357063fe5653188654a6ba4df639da2fbf3ca
SHA512 91872eaa1f3f45232ab2d753585e650ded24c6cc8cc1d2a476fa98a61210177bd83570c52594b5ad562fc27cb76e034122f16a922c6910e4ed486da1d3c45c24

C:\Users\Admin\AppData\Local\Temp\_MEI3922\libssl-1_1.dll

MD5 0bfdc638fbe4135514de3aebf59fa410
SHA1 963addfdadf918339dfcab33e07bb6c48c86099e
SHA256 77affb7e88ab70fa04e382e29bf04a94ddf36c5cbd88b29ff33e15912d83ed01
SHA512 768abcc391eea4a3b34b0aade99932cd9befb922dcf9e720edf4c4719938214236e8668eca67026bd07567fbd10bbba98d63f47d63a81c7be1adce3bdd1973e4

C:\Users\Admin\AppData\Local\Temp\_MEI3922\libpng16-16.dll

MD5 55009dd953f500022c102cfb3f6a8a6c
SHA1 07af9f4d456ddf86a51da1e4e4c5b54b0cf06ddb
SHA256 20391787cba331cfbe32fbf22f328a0fd48924e944e80de20ba32886bf4b6fd2
SHA512 4423d3ec8fef29782f3d4a21feeac9ba24c9c765d770b2920d47b4fb847a96ff5c793b20373833b4ff8bc3d8fa422159c64beffb78ce5768ed22742740a8c6c6

C:\Users\Admin\AppData\Local\Temp\_MEI3922\libopusfile-0.dll

MD5 2d5274bea7ef82f6158716d392b1be52
SHA1 ce2ff6e211450352eec7417a195b74fbd736eb24
SHA256 6dea07c27c0cc5763347357e10c3b17af318268f0f17c7b165325ce524a0e8d5
SHA512 9973d68b23396b3aa09d2079d18f2c463e807c9c1fdf4b1a5f29d561e8d5e62153e0c7be23b63975ad179b9599ff6b0cf08ebdbe843d194483e7ec3e7aeb232a

C:\Users\Admin\AppData\Local\Temp\_MEI3922\libopus-0.x64.dll

MD5 e56f1b8c782d39fd19b5c9ade735b51b
SHA1 3d1dc7e70a655ba9058958a17efabe76953a00b4
SHA256 fa8715dd0df84fdedbe4aa17763b2ab0db8941fa33421b6d42e25e59c4ae8732
SHA512 b7702e48b20a8991a5c537f5ba22834de8bb4ba55862b75024eace299263963b953606ee29e64d68b438bb0904273c4c20e71f22ccef3f93552c36fb2d1b2c46

C:\Users\Admin\AppData\Local\Temp\_MEI3922\libopus-0.dll

MD5 3fb9d9e8daa2326aad43a5fc5ddab689
SHA1 55523c665414233863356d14452146a760747165
SHA256 fd8de9169ccf53c5968eec0c90e9ff3a66fb451a5bf063868f3e82007106b491
SHA512 f263ea6e0fab84a65fe3a9b6c0fe860919eee828c84b888a5aa52dea540434248d1e810a883a2aff273cd9f22c607db966dd8776e965be6d2cfe1b50a1af1f57

C:\Users\Admin\AppData\Local\Temp\_MEI3922\libogg-0.dll

MD5 0d65168162287df89af79bb9be79f65b
SHA1 3e5af700b8c3e1a558105284ecd21b73b765a6dc
SHA256 2ec2322aec756b795c2e614dab467ef02c3d67d527ad117f905b3ab0968ccf24
SHA512 69af81fd2293c31f456b3c78588bb6a372fe4a449244d74bfe5bfaa3134a0709a685725fa05055cfd261c51a96df4b7ebd8b9e143f0e9312c374e54392f8a2c2

C:\Users\Admin\AppData\Local\Temp\_MEI3922\libmodplug-1.dll

MD5 2bb2e7fa60884113f23dcb4fd266c4a6
SHA1 36bbd1e8f7ee1747c7007a3c297d429500183d73
SHA256 9319bf867ed6007f3c61da139c2ab8b74a4cb68bf56265a101e79396941f6d3b
SHA512 1ddd4b9b9238c1744e0a1fe403f136a1def8df94814b405e7b01dd871b3f22a2afe819a26e08752142f127c3efe4ebae8bfd1bd63563d5eb98b4644426f576b2

C:\Users\Admin\AppData\Local\Temp\_MEI3922\libjpeg-9.dll

MD5 c22b781bb21bffbea478b76ad6ed1a28
SHA1 66cc6495ba5e531b0fe22731875250c720262db1
SHA256 1eed2385030348c84bbdb75d41d64891be910c27fab8d20fc9e85485fcb569dd
SHA512 9b42cad4a715680a27cd79f466fd2913649b80657ff042528cba2946631387ed9fb027014d215e1baf05839509ca5915d533b91aa958ae0525dea6e2a869b9e4

C:\Users\Admin\AppData\Local\Temp\_MEI3922\freetype.dll

MD5 04a9825dc286549ee3fa29e2b06ca944
SHA1 5bed779bf591752bb7aa9428189ec7f3c1137461
SHA256 50249f68b4faf85e7cd8d1220b7626a86bc507af9ae400d08c8e365f9ab97cde
SHA512 0e937e4de6cbc9d40035b94c289c2798c77c44fc1dc7097201f9fab97c7ff9e56113c06c51693f09908283eda92945b36de67351f893d4e3162e67c078cff4ec

memory/4728-1325-0x00007FFD56370000-0x00007FFD566E5000-memory.dmp

memory/4728-1339-0x00007FFD660B0000-0x00007FFD660D7000-memory.dmp

memory/4728-1342-0x00007FFD620C0000-0x00007FFD62178000-memory.dmp

memory/4728-1341-0x00007FFD66600000-0x00007FFD6662E000-memory.dmp

memory/4728-1340-0x00007FFD57370000-0x00007FFD5748C000-memory.dmp

memory/4728-1338-0x00007FFD66B50000-0x00007FFD66B5B000-memory.dmp

memory/4728-1337-0x00007FFD66D90000-0x00007FFD66D9D000-memory.dmp

memory/4728-1336-0x00007FFD566F0000-0x00007FFD56CD8000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI3922\charset_normalizer\md__mypyc.cp311-win_amd64.pyd

MD5 767c3533e89954a2cbdd386026d51cd6
SHA1 bb41cc8be2b8aa40d26a383ff6dde2b260ada1fb
SHA256 e4d22760e9bf26bf8d6b9f7083d9e5f788a6ba3ad62b78272c5f73af9cdecae7
SHA512 a11c416aeb11b604b70522a23af4eead5f568b161ac18dc99ecfd436475762e9b436fbb86a015a583dc05c93b1e68e1970ecdc58953cfbf98612b91c2d16a928

C:\Users\Admin\AppData\Local\Temp\_MEI3922\charset_normalizer\md.cp311-win_amd64.pyd

MD5 ecfbd9b49ae51f8e3374e17aff3aec1e
SHA1 3e66e0f757d0f18afd546d158a96fd1707b35a5f
SHA256 1237b21174cd4aee97aa4d80ee953dd4ce91b2e1beb4788a55cb25a0213521aa
SHA512 9c9f682b55a589f1c10c99b89cc2620ce3d89d96c17096feb7e0ddfd6ac2f2b279885084b131080a57a6a324a9bce928e618348545c2b0af06c0ec4c267362c8

memory/4728-1329-0x00007FFD686A0000-0x00007FFD686AD000-memory.dmp

memory/4728-1328-0x00007FFD66630000-0x00007FFD66649000-memory.dmp

memory/4728-1343-0x00007FFD66070000-0x00007FFD660A7000-memory.dmp

memory/4728-1349-0x00007FFD65E80000-0x00007FFD65E8B000-memory.dmp

memory/4728-1348-0x00007FFD66DA0000-0x00007FFD66DB9000-memory.dmp

memory/4728-1347-0x00007FFD665E0000-0x00007FFD665EC000-memory.dmp

memory/4728-1346-0x00007FFD665F0000-0x00007FFD665FB000-memory.dmp

memory/4728-1345-0x00007FFD66910000-0x00007FFD6691B000-memory.dmp

memory/4728-1344-0x00007FFD66EC0000-0x00007FFD66EE4000-memory.dmp

memory/4728-1351-0x00007FFD65E70000-0x00007FFD65E7C000-memory.dmp

memory/4728-1350-0x00007FFD66890000-0x00007FFD668BD000-memory.dmp

memory/4728-1359-0x00007FFD62590000-0x00007FFD6259C000-memory.dmp

memory/4728-1358-0x00007FFD66630000-0x00007FFD66649000-memory.dmp

memory/4728-1357-0x00007FFD64B90000-0x00007FFD64B9C000-memory.dmp

memory/4728-1356-0x00007FFD625A0000-0x00007FFD625AE000-memory.dmp

memory/4728-1355-0x00007FFD625B0000-0x00007FFD625BD000-memory.dmp

memory/4728-1354-0x00007FFD64BA0000-0x00007FFD64BAB000-memory.dmp

memory/4728-1353-0x00007FFD56370000-0x00007FFD566E5000-memory.dmp

memory/4728-1352-0x00007FFD66870000-0x00007FFD66884000-memory.dmp

memory/4728-1369-0x00007FFD5D910000-0x00007FFD5D91C000-memory.dmp

memory/4728-1368-0x00007FFD5D920000-0x00007FFD5D932000-memory.dmp

memory/4728-1367-0x00007FFD5FA00000-0x00007FFD5FA0D000-memory.dmp

memory/4728-1366-0x00007FFD62080000-0x00007FFD6208B000-memory.dmp

memory/4728-1365-0x00007FFD62090000-0x00007FFD6209C000-memory.dmp

memory/4728-1364-0x00007FFD620A0000-0x00007FFD620AB000-memory.dmp

memory/4728-1363-0x00007FFD620B0000-0x00007FFD620BB000-memory.dmp

memory/4728-1362-0x00007FFD620C0000-0x00007FFD62178000-memory.dmp

memory/4728-1361-0x00007FFD57370000-0x00007FFD5748C000-memory.dmp

memory/4728-1360-0x00007FFD660B0000-0x00007FFD660D7000-memory.dmp

memory/4728-1371-0x00007FFD5D8F0000-0x00007FFD5D905000-memory.dmp

memory/4728-1370-0x00007FFD66070000-0x00007FFD660A7000-memory.dmp

memory/4728-1372-0x00007FFD5D8D0000-0x00007FFD5D8E2000-memory.dmp

memory/4728-1373-0x00007FFD57D00000-0x00007FFD57D14000-memory.dmp

memory/4728-1374-0x00007FFD57CD0000-0x00007FFD57CF2000-memory.dmp

memory/4728-1375-0x00007FFD57A70000-0x00007FFD57A8B000-memory.dmp

memory/4728-1376-0x00007FFD57A50000-0x00007FFD57A69000-memory.dmp

memory/4728-1377-0x00007FFD57A00000-0x00007FFD57A4D000-memory.dmp

memory/4728-1379-0x00007FFD579A0000-0x00007FFD579D2000-memory.dmp

memory/4728-1378-0x00007FFD579E0000-0x00007FFD579F1000-memory.dmp

memory/4728-1380-0x00007FFD6FEA0000-0x00007FFD6FEAA000-memory.dmp

memory/4728-1382-0x00007FFD57980000-0x00007FFD5799E000-memory.dmp

memory/4728-1381-0x00007FFD5D8F0000-0x00007FFD5D905000-memory.dmp

memory/4728-1384-0x00007FFD57920000-0x00007FFD5797D000-memory.dmp

memory/4728-1383-0x00007FFD5D8D0000-0x00007FFD5D8E2000-memory.dmp

memory/4728-1385-0x00007FFD57D00000-0x00007FFD57D14000-memory.dmp

memory/4728-1386-0x00007FFD578F0000-0x00007FFD57919000-memory.dmp

memory/4728-1388-0x00007FFD578C0000-0x00007FFD578EE000-memory.dmp

memory/4728-1387-0x00007FFD57CD0000-0x00007FFD57CF2000-memory.dmp

memory/4728-1390-0x00007FFD57890000-0x00007FFD578B3000-memory.dmp

memory/4728-1391-0x00007FFD57A50000-0x00007FFD57A69000-memory.dmp

memory/4728-1392-0x00007FFD57710000-0x00007FFD57883000-memory.dmp

memory/4728-1389-0x00007FFD57A70000-0x00007FFD57A8B000-memory.dmp

memory/4728-1394-0x00007FFD576F0000-0x00007FFD57708000-memory.dmp

memory/4728-1393-0x00007FFD57A00000-0x00007FFD57A4D000-memory.dmp

memory/4728-1396-0x00007FFD5D210000-0x00007FFD5D21B000-memory.dmp

memory/4728-1395-0x00007FFD579A0000-0x00007FFD579D2000-memory.dmp

memory/4728-1397-0x00007FFD5C230000-0x00007FFD5C23B000-memory.dmp

memory/4728-1399-0x00007FFD576D0000-0x00007FFD576DB000-memory.dmp

memory/4728-1402-0x00007FFD576B0000-0x00007FFD576BB000-memory.dmp

memory/4728-1401-0x00007FFD576A0000-0x00007FFD576AC000-memory.dmp

memory/4728-1400-0x00007FFD576C0000-0x00007FFD576CC000-memory.dmp

memory/4728-1398-0x00007FFD576E0000-0x00007FFD576EC000-memory.dmp

memory/4728-1405-0x00007FFD57680000-0x00007FFD5768E000-memory.dmp

memory/4728-1404-0x00007FFD57690000-0x00007FFD5769D000-memory.dmp

memory/4728-1403-0x00007FFD57920000-0x00007FFD5797D000-memory.dmp

memory/4728-1406-0x00007FFD578F0000-0x00007FFD57919000-memory.dmp

memory/4728-1415-0x00007FFD578C0000-0x00007FFD578EE000-memory.dmp

memory/4728-1414-0x00007FFD575F0000-0x00007FFD575FC000-memory.dmp

memory/4728-1413-0x00007FFD57600000-0x00007FFD57612000-memory.dmp

memory/4728-1416-0x00007FFD57890000-0x00007FFD578B3000-memory.dmp

memory/4728-1417-0x00007FFD575B0000-0x00007FFD575E5000-memory.dmp

memory/4728-1419-0x00007FFD572B0000-0x00007FFD5736C000-memory.dmp

memory/4728-1418-0x00007FFD57710000-0x00007FFD57883000-memory.dmp

memory/4728-1412-0x00007FFD57620000-0x00007FFD5762D000-memory.dmp

memory/4728-1411-0x00007FFD57630000-0x00007FFD5763B000-memory.dmp

memory/4728-1410-0x00007FFD57640000-0x00007FFD5764C000-memory.dmp

memory/4728-1409-0x00007FFD57650000-0x00007FFD5765B000-memory.dmp

memory/4728-1408-0x00007FFD57660000-0x00007FFD5766B000-memory.dmp

memory/4728-1407-0x00007FFD57670000-0x00007FFD5767C000-memory.dmp

memory/4728-1421-0x00007FFD57580000-0x00007FFD575AB000-memory.dmp

memory/4728-1420-0x00007FFD576F0000-0x00007FFD57708000-memory.dmp

memory/4728-1422-0x00007FFD56120000-0x00007FFD56369000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_12eswvsm.kgw.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/4728-1468-0x00007FFD566F0000-0x00007FFD56CD8000-memory.dmp

memory/4728-1492-0x00007FFD579A0000-0x00007FFD579D2000-memory.dmp

memory/4728-1491-0x00007FFD579E0000-0x00007FFD579F1000-memory.dmp

memory/4728-1490-0x00007FFD57A00000-0x00007FFD57A4D000-memory.dmp

memory/4728-1489-0x00007FFD57A50000-0x00007FFD57A69000-memory.dmp

memory/4728-1488-0x00007FFD57A70000-0x00007FFD57A8B000-memory.dmp

memory/4728-1487-0x00007FFD57CD0000-0x00007FFD57CF2000-memory.dmp

memory/4728-1486-0x00007FFD57D00000-0x00007FFD57D14000-memory.dmp

memory/4728-1485-0x00007FFD5D8D0000-0x00007FFD5D8E2000-memory.dmp

memory/4728-1484-0x00007FFD5D8F0000-0x00007FFD5D905000-memory.dmp

memory/4728-1483-0x00007FFD66070000-0x00007FFD660A7000-memory.dmp

memory/4728-1482-0x00007FFD57370000-0x00007FFD5748C000-memory.dmp

memory/4728-1478-0x00007FFD620C0000-0x00007FFD62178000-memory.dmp

memory/4728-1474-0x00007FFD56370000-0x00007FFD566E5000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI43082\cryptography-44.0.0.dist-info\INSTALLER

MD5 365c9bfeb7d89244f2ce01c1de44cb85
SHA1 d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256 ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512 d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

memory/1624-3903-0x00007FFD566F0000-0x00007FFD56CD8000-memory.dmp

memory/1624-3941-0x00007FFD578C0000-0x00007FFD578D9000-memory.dmp

memory/1624-3940-0x00007FFD578E0000-0x00007FFD578FB000-memory.dmp

memory/1624-3939-0x00007FFD57900000-0x00007FFD57922000-memory.dmp

memory/1624-3938-0x00007FFD57930000-0x00007FFD57944000-memory.dmp

memory/1624-3937-0x00007FFD57950000-0x00007FFD57962000-memory.dmp

memory/1624-3936-0x00007FFD57CD0000-0x00007FFD57CE5000-memory.dmp

memory/1624-3935-0x00007FFD57CF0000-0x00007FFD57CFC000-memory.dmp

memory/1624-3934-0x00007FFD57D00000-0x00007FFD57D12000-memory.dmp

memory/1624-3933-0x00007FFD5C230000-0x00007FFD5C23D000-memory.dmp

memory/1624-3932-0x00007FFD5D210000-0x00007FFD5D21B000-memory.dmp

memory/1624-3931-0x00007FFD5D8C0000-0x00007FFD5D8CC000-memory.dmp

memory/1624-3930-0x00007FFD5D8D0000-0x00007FFD5D8DB000-memory.dmp

memory/1624-3929-0x00007FFD5D8E0000-0x00007FFD5D8EB000-memory.dmp

memory/1624-3928-0x00007FFD5D8F0000-0x00007FFD5D8FC000-memory.dmp

memory/1624-3927-0x00007FFD5FA00000-0x00007FFD5FA0E000-memory.dmp

memory/1624-3926-0x00007FFD62080000-0x00007FFD6208D000-memory.dmp

memory/1624-3925-0x00007FFD64B90000-0x00007FFD64B9C000-memory.dmp

memory/1624-3924-0x00007FFD64BA0000-0x00007FFD64BAB000-memory.dmp

memory/1624-3923-0x00007FFD65E70000-0x00007FFD65E7C000-memory.dmp

memory/1624-3922-0x00007FFD65E80000-0x00007FFD65E8B000-memory.dmp

memory/1624-3921-0x00007FFD665E0000-0x00007FFD665EC000-memory.dmp

memory/1624-3920-0x00007FFD66910000-0x00007FFD6691B000-memory.dmp

memory/1624-3919-0x00007FFD66B50000-0x00007FFD66B5B000-memory.dmp

memory/1624-3918-0x00007FFD5D900000-0x00007FFD5D937000-memory.dmp

memory/1624-3917-0x00007FFD57970000-0x00007FFD57A8C000-memory.dmp

memory/1624-3916-0x00007FFD62090000-0x00007FFD620B7000-memory.dmp

memory/1624-3915-0x00007FFD66D90000-0x00007FFD66D9B000-memory.dmp

memory/1624-3914-0x00007FFD686A0000-0x00007FFD686AD000-memory.dmp

memory/1624-3913-0x00007FFD620C0000-0x00007FFD62178000-memory.dmp

memory/1624-3912-0x00007FFD62590000-0x00007FFD625BE000-memory.dmp

memory/1624-3911-0x00007FFD68810000-0x00007FFD6881D000-memory.dmp

memory/1624-3910-0x00007FFD66070000-0x00007FFD66089000-memory.dmp

memory/1624-3909-0x00007FFD56370000-0x00007FFD566E5000-memory.dmp

memory/1624-3908-0x00007FFD66090000-0x00007FFD660A4000-memory.dmp

memory/1624-3907-0x00007FFD660B0000-0x00007FFD660DD000-memory.dmp

memory/1624-3906-0x00007FFD66DA0000-0x00007FFD66DB9000-memory.dmp

memory/1624-3905-0x00007FFD6FEA0000-0x00007FFD6FEAF000-memory.dmp

memory/1624-3904-0x00007FFD66EC0000-0x00007FFD66EE4000-memory.dmp