Malware Analysis Report

2024-11-15 07:47

Sample ID 240619-qypmwa1erh
Target DBDRegion.exe
SHA256 ed560ef0e071cfe478013a2271639babca95148796e8dcb01b10ac5ef671f691
Tags
pyinstaller
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

ed560ef0e071cfe478013a2271639babca95148796e8dcb01b10ac5ef671f691

Threat Level: Shows suspicious behavior

The file DBDRegion.exe was found to be: Shows suspicious behavior.

Malicious Activity Summary

pyinstaller

Loads dropped DLL

Detects Pyinstaller

Unsigned PE

Suspicious behavior: AddClipboardFormatListener

Suspicious use of AdjustPrivilegeToken

Suspicious use of SetWindowsHookEx

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-19 13:40

Signatures

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-19 13:40

Reported

2024-06-19 13:44

Platform

win10v2004-20240611-en

Max time kernel

141s

Max time network

105s

Command Line

C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe -d

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: 33 N/A C:\Windows\system32\AUDIODG.EXE N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\system32\AUDIODG.EXE N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe

C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe -d

C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe

C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe -d

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x4a4 0x4f4

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 docs.aws.amazon.com udp
FR 52.222.201.16:443 docs.aws.amazon.com tcp
NL 23.62.61.75:443 www.bing.com tcp
US 8.8.8.8:53 16.201.222.52.in-addr.arpa udp
US 8.8.8.8:53 75.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 86.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 107.12.20.2.in-addr.arpa udp
US 8.8.8.8:53 138.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 10.28.171.150.in-addr.arpa udp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI4562\ucrtbase.dll

MD5 0e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA1 4189f4459c54e69c6d3155a82524bda7549a75a6
SHA256 8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512 a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

C:\Users\Admin\AppData\Local\Temp\_MEI4562\python310.dll

MD5 efe2d90cc0e7b8741109513e28bcd62a
SHA1 0f3076290f70a3b6646376a48a95709b1967f8d7
SHA256 b174d52c48323281b4c71881b77e67c7b38a430b9ee3e1c33ed8468eb80cce37
SHA512 6051a1b244f6980030cec4408480f8f910770ae0f1122fe1f8a373add76fce63acaae987889c65587939a769ba07aa62c9aadbb396cab6b648fa4d25e179fcb7

C:\Users\Admin\AppData\Local\Temp\_MEI4562\VCRUNTIME140.dll

MD5 8697c106593e93c11adc34faa483c4a0
SHA1 cd080c51a97aa288ce6394d6c029c06ccb783790
SHA256 ff43e813785ee948a937b642b03050bb4b1c6a5e23049646b891a66f65d4c833
SHA512 724bbed7ce6f7506e5d0b43399fb3861dda6457a2ad2fafe734f8921c9a4393b480cdd8a435dbdbd188b90236cb98583d5d005e24fa80b5a0622a6322e6f3987

C:\Users\Admin\AppData\Local\Temp\_MEI4562\zlib.dll

MD5 d00d9d7b9e0215553c30bb974009356b
SHA1 4608882531ad0c106732682cbe746d911c38fc9a
SHA256 54c755e6b90499a5ef49a65ce9472535286fe4db3565a06c4a53f8a4833532dc
SHA512 8795959cdd8525b449193b90cebe81e8ae7876858a6cc706a255c6d2af5696be92e1dc93ef34551b4888b51c1f5dce920d834ef6ff8f8f4693cd4433e488dc56

C:\Users\Admin\AppData\Local\Temp\_MEI4562\base_library.zip

MD5 6dbdd4d0d703a952f340bc7ec651e946
SHA1 78454cb350e9128d8571aa09028f6dafe353babd
SHA256 116ddbb8c337b18480478e3cf75cf457e3dae1eb35c4986559d1075af29ddb89
SHA512 d63c3bea11bc80bceb3bb800d964205f8211e203e84fd2c36d1565a770002fe11971bf44efc85bf620fd8431690538f310990f9a79ac5c2b66019378b153e04b

C:\Users\Admin\AppData\Local\Temp\_MEI4562\_ctypes.pyd

MD5 7b0d084a34e97a0c965c638f154ceb50
SHA1 efe50cfee0a977131bb320ad36ec67572ab32a3e
SHA256 b03acf0932a63396b9c24d4e8a89cfb45fa4073dac2242b0082fd55d1a116e80
SHA512 bb4343db58f6bc41dbde3d54f88060279c3ecee295d2f4b858b97ca39206a7a9960ba25462608c434ba865cd0c0b805eeb54f357ed740611fde1954c3359acc3

C:\Users\Admin\AppData\Local\Temp\_MEI4562\ffi.dll

MD5 0f18bcbeb2da9ceb5eb5c6f3f9113fe9
SHA1 0a0dba0a23a48f117480d63fee0fa61e39ae39ca
SHA256 4ec927d13273dd1a5ffd6b42151e9ff097ca8b07a169b697496c98ce457ca913
SHA512 1cd99d0effb44f5dacc2eb5107162886e31acc5f5cff7484f2c949d95562d54cc200189990d33ebb15c5c012f5514e473cabcab66373c76e6db6e7d76623ff05

C:\Users\Admin\AppData\Local\Temp\_MEI4562\LIBBZ2.dll

MD5 9ecb733cf14bbff80b005ddb38540497
SHA1 2f725f35a6602dc6a70a8339e90721d9e37dadb4
SHA256 e4ba6a29fe1611815b74da3fd55bd657564edafac7a9907b0819ff8fb091eed5
SHA512 1dc0e845b47483faca748efa6ed956570c0d00c5909f3b25200d653b5c42a1f0086426ce1f483af32c36ec83043fa8cfd1577f3823568f9faeafe438f41b9a40

C:\Users\Admin\AppData\Local\Temp\_MEI4562\liblzma.dll

MD5 ca72943b95ece5777b3a32e057637210
SHA1 5d4e0de09be53043fba47d8f0acbc9f0707952cf
SHA256 ffdb2b23d1bb49dbdbab5a43328d0eeaf6b685ecd60de09dca97e5b30be3795d
SHA512 58e304346b7141cdbf5936b2e4a5746ae134da222beeb02a288b7eb5b19861d1c77d73a13d74505e87c4b5c94d78ca327098944025102f0a18c07c21ea976d74

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-crt-utility-l1-1-0.dll

MD5 54f27114eb0fda1588362bb6b5567979
SHA1 eaa07829d012206ac55fb1af5cc6a35f341d22be
SHA256 984306a3547be2f48483d68d0466b21dda9db4be304bedc9ffdb953c26cac5a1
SHA512 18d2bdce558655f2088918241efdf9297dfe4a14a5d8d9c5be539334ae26a933b35543c9071cedada5a1bb7c2b20238e9d012e64eb5bbf24d0f6b0b726c0329d

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-crt-time-l1-1-0.dll

MD5 6b33b34888ccecca636971fbea5e3de0
SHA1 ee815a158baacb357d9e074c0755b6f6c286b625
SHA256 00ac02d39b7b16406850e02ca4a6101f45d6f7b4397cc9e069f2ce800b8500b9
SHA512 f52a2141f34f93b45b90eb3bbcdb64871741f2bd5fed22eaaf35e90661e8a59eba7878524e30646206fc73920a188c070a38da9245e888c52d25e36980b35165

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-crt-string-l1-1-0.dll

MD5 96da689947c6e215a009b9c1eca5aec2
SHA1 7f389e6f2d6e5beb2a3baf622a0c0ea24bc4de60
SHA256 885309eb86dccd8e234ba05e13fe0bf59ab3db388ebfbf6b4fd6162d8e287e82
SHA512 8e86fa66a939ff3274c2147463899df575030a575c8f01573c554b760a53b339127d0d967c8cf1d315428e16e470fa1cc9c2150bb40e9b980d4ebf32e226ee89

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-crt-stdio-l1-1-0.dll

MD5 76e0a89c91a28cf7657779d998e679e5
SHA1 982b5da1c1f5b9d74af6243885bcba605d54df8c
SHA256 0189cbd84dea035763a7e52225e0f1a7dcec402734885413add324bffe688577
SHA512 d75d8798ea3c23b3998e8c3f19d0243a0c3a3262cffd8bcee0f0f0b75f0e990c9ce6644150d458e5702a8aa51b202734f7a9161e795f8121f061139ad2ea454f

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-crt-runtime-l1-1-0.dll

MD5 8b9b0d1c8b0e9d4b576d42c66980977a
SHA1 a19acefa3f95d1b565650fdbc40ef98c793358e9
SHA256 371a44ab91614a8c26d159beb872a7b43f569cb5fac8ada99ace98f264a3b503
SHA512 4b1c5730a17118b7065fada3b36944fe4e0260f77676b84453ee5042f6f952a51fd99debca835066a6d5a61ba1c5e17247551340dd02d777a44bc1cae84e6b5f

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-crt-process-l1-1-0.dll

MD5 595d79870970565be93db076afbe73b5
SHA1 ec96f7beeaec14d3b6c437b97b4a18a365534b9b
SHA256 fc50a37acc35345c99344042d7212a4ae88aa52a894cda3dcb9f6db46d852558
SHA512 152849840a584737858fc5e15f0d7802786e823a13ec5a9fc30ee032c7681deaf11c93a8cffead82dc5f73f0cd6f517f1e83b56d61d0e770cbb20e1cfff22840

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-crt-multibyte-l1-1-0.dll

MD5 4e033cfee32edf6be7847e80a5114894
SHA1 91eef52c557aefd0fde27e8df4e3c3b7f99862f2
SHA256 dff24441df89a02dde1cd984e4d3820845bafdff105458ed10d510126117115b
SHA512 e1f3d98959d68ef3d7e86ac4cb3dbdf92a34fcfd1bf0e0db45db66c65af0162ab02926dc5d98c6fc4a759a6010026ee26a9021c67c0190da941a04b783055318

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-crt-math-l1-1-0.dll

MD5 4dd7a61590d07500704e7e775255cb00
SHA1 8b35ec4676bd96c2c4508dc5f98ca471b22deed7
SHA256 a25d0654deb0cea1aef189ba2174d0f13bdf52f098d3a9ec36d15e4bfb30c499
SHA512 1086801260624cf395bf971c9fd671abddcd441ccc6a6eac55f277ccfbab752c82cb1709c8140de7b4b977397a31da6c9c8b693ae92264eb23960c8b1e0993bd

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-crt-locale-l1-1-0.dll

MD5 ab206f2943977256ca3a59e5961e3a4f
SHA1 9c1df49a8dbdc8496ac6057f886f5c17b2c39e3e
SHA256 b3b6ee98aca14cf5bc9f3bc7897bc23934bf85fc4bc25b7506fe4cd9a767047a
SHA512 baccc304b091a087b2300c10f6d18be414abb4c1575274c327104aabb5fdf975ba26a86e423fda6befb5d7564effac0c138eb1bad2d2e226131e4963c7aac5bd

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-crt-heap-l1-1-0.dll

MD5 f9e20dd3b07766307fccf463ab26e3ca
SHA1 60b4cf246c5f414fc1cd12f506c41a1043d473ee
SHA256 af47aebe065af2f045a19f20ec7e54a6e73c0c3e9a5108a63095a7232b75381a
SHA512 13c43eee9c93c9f252087cb397ff2d6b087b1dc92a47ba5493297f080e91b7c39ee5665d6bdc1a80e7320e2b085541fc798a3469b1f249b05dee26bbbb6ab706

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-crt-filesystem-l1-1-0.dll

MD5 f0d507de92851a8c0404ac78c383c5cd
SHA1 78fa03c89ea12ff93fa499c38673039cc2d55d40
SHA256 610332203d29ab218359e291401bf091bb1db1a6d7ed98ab9a7a9942384b8e27
SHA512 a65c9129ee07864f568c651800f6366bca5313ba400814792b5cc9aa769c057f357b5055988c414e88a6cd87186b6746724a43848f96a389a13e347ef5064551

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-crt-environment-l1-1-0.dll

MD5 c712515d052a385991d30b9c6afc767f
SHA1 9a4818897251cacb7fe1c6fe1be3e854985186ad
SHA256 f7c6c7ea22edd2f8bd07aa5b33cbce862ef1dcdc2226eb130e0018e02ff91dc1
SHA512 b7d1e22a169c3869aa7c7c749925a031e8bdd94c2531c6ffe9dae3b3cd9a2ee1409ca26824c4e720be859de3d4b2af637dd60308c023b4774d47afe13284dcd2

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-crt-convert-l1-1-0.dll

MD5 d53637eab49fe1fe1bd45d12f8e69c1f
SHA1 c84e41fdcc4ca89a76ae683cb390a9b86500d3ca
SHA256 83678f181f46fe77f8afe08bfc48aebb0b4154ad45b2efe9bfadc907313f6087
SHA512 94d43da0e2035220e38e4022c429a9c049d6a355a9cb4695ad4e0e01d6583530917f3b785ea6cd2592fdd7b280b9df95946243e395a60dc58ec0c94627832aeb

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-crt-conio-l1-1-0.dll

MD5 6c88d0006cf852f2d8462dfa4e9ca8d1
SHA1 49002b58cb0df2ee8d868dec335133cf225657df
SHA256 d5960c7356e8ab97d0ad77738e18c80433da277671a6e89a943c7f7257ff3663
SHA512 d081843374a43d2e9b33904d4334d49383df04ee7143a8b49600841ece844eff4e8e36b4b5966737ac931ed0350f202270e043f7003bf2748c5418d5e21c2a27

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-util-l1-1-0.dll

MD5 a1952875628359a0632be61ba4727684
SHA1 1e1a5ab47e4c2b3c32c81690b94954b7612bb493
SHA256 a41bede183fa1c70318332d6bc54ef13817aeee6d52b3ab408f95fa532b809f1
SHA512 3f86180cc085dc8c9f6d3c72f5ccc0f5a0c9048343edaf62239eb4b038799845388898408ed7e8eac5d015a9bc42ff428f74585f64f5d3467dddb1303baf4f03

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-timezone-l1-1-0.dll

MD5 f62b66f451f2daa8410ad62d453fa0a2
SHA1 4bf13db65943e708690d6256d7ddd421cc1cc72b
SHA256 48eb5b52227b6fb5be70cb34009c8da68356b62f3e707db56af957338ba82720
SHA512 d64c2a72adf40bd451341552e7e6958779de3054b0cf676b876c3ba7b86147aecba051ac08adc0c3bfb2779109f87dca706c43de3ce36e05af0ddee02bbbf419

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-sysinfo-l1-1-0.dll

MD5 df50047bbd2cf3a4b0cf0567514b464c
SHA1 f20ae25484a1c1b43748a1f0c422f48f092ad2c1
SHA256 8310d855398f83cb5b9ca3adeb358da1354557aec5c82c8ef91a29f79a47f620
SHA512 5c3bfc2ccb2ee864b99f6709677474327e85889f4c962ea0a1ef9e1e876dc88b1d8e8e0f6c1422f634ff1c84a861c34e52ee07dac7fdde505b508bea80562b9f

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-synch-l1-2-0.dll

MD5 47388f3966e732706054fe3d530ed0dc
SHA1 a9aebbbb73b7b846b051325d7572f2398f5986ee
SHA256 59c14541107f5f2b94bbf8686efee862d20114bcc9828d279de7bf664d721132
SHA512 cce1fc5bcf0951b6a76d456249997b427735e874b650e5b50b3d278621bf99e39c4fc7fee081330f20762f797be1b1c048cb057967ec7699c9546657b3e248ee

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-synch-l1-1-0.dll

MD5 6961bf5622ffcd14c16fbfc1296950a4
SHA1 5584c189216a17228cca6cd07037aaa9a8603241
SHA256 50a1542d16b42ecb3edc1edd0881744171ea52f7155e5269ad39234f0ea691de
SHA512 a4d0c15acbff4e9140ae4264fa24bd4c65fb2d1052a0b37bf281498f3b641fef563c18115511829a23340c9440f547028d36015ba38cbd51ad0744d44d5ccd87

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-string-l1-1-0.dll

MD5 b7cbc8d977a00a2574e110b01124ed40
SHA1 637e4a9946691f76e6deb69bdc21c210921d6f07
SHA256 854db7d2085caacf83d6616761d8bdcbacb54a06c9a9b171b1c1a15e7dc10908
SHA512 b415ef4092fa62d39941bf529a2032bc8b591c54ed2050ea4730f198899f147539b2c0e97f3c4f14848c71066924c1848ae5f07779a1a47ab4c5e46f02be7258

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-rtlsupport-l1-1-0.dll

MD5 2166fb99debbb1b0649c4685cf630a4a
SHA1 24f37d46dfc0ef303ef04abf9956241af55d25c9
SHA256 cdc4cfebf9cba85b0d3979befdb258c1f2cfcb79edd00da2dfbf389d080e4379
SHA512 de27d06b1f306110b42d0ed2642a555862d0ade7e56e5f2908e399f140aa5f43904e08d690bcb0d2f4d11d799ec18fa682db048da57d99cd99891e45add86371

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-profile-l1-1-0.dll

MD5 7028cf6b6b609cb0e31abd1f618e42d0
SHA1 e7e0b18a40a35bd8b0766ac72253de827432e148
SHA256 9e98b03a3ca1ebabdceb7ed9c0ceb4912bb68eb68f3e0df17f39c7a55fada31d
SHA512 d035ccfd0de316e64187c18e6e5b36e14f615f872c08740ec22ef2c12d592e37d78ab154202926a56ab01d669eb5870dff651280a882d6bf2a700c43dcd25ac2

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-processthreads-l1-1-1.dll

MD5 d699333637db92d319661286df7cc39e
SHA1 0bffb9ed366853e7019452644d26e8e8f236241b
SHA256 fe760614903e6d46a1be508dccb65cf6929d792a1db2c365fc937f2a8a240504
SHA512 6fa9ff0e45f803faf3eb9908e810a492f6f971cb96d58c06f408980ab40cba138b52d853aa0e3c68474053690dfafa1817f4b4c8fb728d613696b6c516fa0f51

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-processthreads-l1-1-0.dll

MD5 5faf9a33bab1d39dd9f820d34339b3d4
SHA1 50699041060d14576ed7bacbd44be9af80eb902a
SHA256 a1221836731c7e52c42d5809cc02b17c5ec964601631ec15a84201f423da4ac4
SHA512 73c25d1338df9aee5211fbb0e1b14e6bd853e31746c63bc46f44810622b09d52ee39b8e8a57c655da63d3d3d4025c2cba4d8673893d022417a2032ba3d935061

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-processenvironment-l1-1-0.dll

MD5 f3b4ab35a65a8d938c6b60ad59ba6e7f
SHA1 2745259f4dbbefbf6b570ee36d224abdb18719bc
SHA256 ea2972fec12305825162ae3e1ae2b6c140e840be0e7ebb51a7a77b7feeda133a
SHA512 a88afb66311494d6c15613c94555ba436cd2f75e11a49a448c9c6776dfba24cda25a44792a1e8b3e680c1ad3ad0574b43ac2328c6e41ff0832139c94b066dbf5

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-namedpipe-l1-1-0.dll

MD5 a056d4eeaae37deab8333dcc4c910a93
SHA1 cb59f1fe73c17446eb196fc0dd7d944a0cd9d81f
SHA256 593fa2aa2474508ad942bbaa0fdc9a1badd81c85b0dff1c43b90a47c23ad5fb7
SHA512 c2f811994182ef51d0c011c19336179da69357e5f284f787bcdb54f90c32768a959232a477534f7e62cd3d71a048a13e91b20042e2fe6ab108d606c7c8df9255

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-memory-l1-1-0.dll

MD5 6def20ed13972f3c3f08dba8ecf3d6cc
SHA1 9c03356cf48112563bb845479f40bf27b293e95e
SHA256 c2e887a17875d39099d662a42f58c120b9cc8a799afd87a9e49adf3faddd2b68
SHA512 5b4d2b1152bed14108dc58d358b1082e27defd1001d36cd72ec6f030a34d6caf9b01c3c1dd8a9ac66d1937fcf86a6fe3469ac93b1e76d933a8f4b51c1f782f65

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-localization-l1-2-0.dll

MD5 588bd2a8e0152e0918742c1a69038f1d
SHA1 9874398548891f6a08fc06437996f84eb7495783
SHA256 a07cc878ab5595aacd4ab229a6794513f897bd7ad14bcec353793379146b2094
SHA512 32ffe64c697f94c4db641ab3e20b0f522cf3eba9863164f1f6271d2f32529250292a16be95f32d852480bd1b59b8b0554c1e7fd7c7a336f56c048f4f56e4d62f

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-libraryloader-l1-1-0.dll

MD5 5d5fae1a17961d6ee37637f04fe99b8a
SHA1 47143a66b4a2e2ba019bf1fd07bcca9cfb8bb117
SHA256 8e01eb923fc453f927a7eca1c8aa5643e43b360c76b648088f51b31488970aa0
SHA512 9db32ec8416320dcb28f874b4679d2d47a5ae56317fdc9d2d65ebb553f1d6345c3dd0024294a671a694337683dd4e77254595a9cdbfe115c80d0ef53516d46aa

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-interlocked-l1-1-0.dll

MD5 39809cc5dabf769da8871a91a8ed9e69
SHA1 f779cdef9ded19402aa72958085213d6671ca572
SHA256 5cd00ff4731691f81ff528c4b5a2e408548107efc22cc6576048b0fdce3dfbc9
SHA512 83a8246839d28378c6f6951d7593dc98b6caa6dbca5fbd023b00b3b1a9eba0597943838c508493533c2de276c4d2f9107d890e1c9a493ee834351cff5dfd2cab

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-heap-l1-1-0.dll

MD5 cdc266896e0dbe6c73542f6dec19de23
SHA1 b4310929ccb82dd3c3a779cab68f1f9f368076f2
SHA256 87a5c5475e9c26fabfead6802dac8a62e2807e50e0d18c4bfadcb15ebf5bcbc0
SHA512 79a29041699f41938174a6ec9797faf8d6bf7764657d801cb3af15c225f8eab0135d59cfa627bd02dd7459f7b857d62299e4d082586ce690627ebdf1267ebb21

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-handle-l1-1-0.dll

MD5 cce27ff9b1e78b61955682788452f785
SHA1 a2e2a40cea25ea4fd64b8deaf4fbe4a2db94107a
SHA256 8ee2de377a045c52bbb05087ae3c2f95576edfb0c2767f40b13454f2d9f779de
SHA512 1fcec1cd70426e3895c48598dfc359839d2b3f2b1e3e94314872a866540353460ec932bf3841e5afe89aa4d6c6fac768e21ae368d68c2bb15f65960f6f5d7d5b

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-file-l2-1-0.dll

MD5 bfffa7117fd9b1622c66d949bac3f1d7
SHA1 402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2
SHA256 1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e
SHA512 b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-file-l1-2-0.dll

MD5 49c3ffd47257dbcb67a6be9ee112ba7f
SHA1 04669214375b25e2dc8a3635484e6eeb206bc4eb
SHA256 322d963d2a2aefd784e99697c59d494853d69bed8efd4b445f59292930a6b165
SHA512 bda5e6c669b04aaed89538a982ef430cef389237c6c1d670819a22b2a20bf3c22aef5cb4e73ef7837cbbd89d870693899f97cb538122059c885f4b19b7860a98

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-file-l1-1-0.dll

MD5 241338aef5e2c18c80fb1db07aa8bcdf
SHA1 9acbeef0ac510c179b319ca69cd5378d0e70504d
SHA256 56de091efe467fe23cc989c1ee21f3249a1bdb2178b51511e3bd514df12c5ccb
SHA512 b9fd37f01a58594e48fa566c41827b2b9499605d9e55c2178e83ee41c8c5f50a4df2c85efea94ca586ea0ea4a6d984ebb7ca2193e9306fcb853b147b2c76bc2d

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-errorhandling-l1-1-0.dll

MD5 a5883c68d432f593812ab3b755b808db
SHA1 51cbb7ba47802dc630c2507750432c55f5979c27
SHA256 b3715112a7ca4c6cc0efee044bd82444d3267a379e33a3ec118d87e75604204d
SHA512 27153e29e99a905fa4c8b3ede078644a3a3f29fdf7b98e387e39c5c60444e326c92afd74da8fee225f7ddf39724a0daef68ba238f3cc64fb7860172b8f29d79a

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-debug-l1-1-0.dll

MD5 9476affaac53e6e34405c4001f141805
SHA1 e7c8a6c29c3158f8b332eea5c33c3b1e044b5f73
SHA256 55574f9e80d313048c245acefd21801d0d6c908a8a5049b4c46253efaf420f89
SHA512 f8e3476a09d888caebd50da0ea2debc4006004e72af677919413655ab4595622cac524f1bc6c13406ee341ae0052a19ed83826ad530f652e73b2c65d4fa65680

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-datetime-l1-1-0.dll

MD5 16789cc09a417d7deb590fffe4ed02dc
SHA1 4940d5b92b6b80a40371f8df073bf3eb406f5658
SHA256 3b68d7ab0641de6b3e81d209b7c0d3896e4ffa76617bbadd01eb54036cdd1b07
SHA512 19e4f086cc2137ee60316b0736b3c6b3780578896df9a826edfe004bb74bee8e051c511a84d8a7ea278a5f47c82b9c955394f629ab0bb0740ecb51293d9be7b7

C:\Users\Admin\AppData\Local\Temp\_MEI4562\api-ms-win-core-console-l1-1-0.dll

MD5 e5912b05988259dad0d6d04c8a17d19b
SHA1 724f4f91041ad595e365b724a0348c83acf12bbb
SHA256 9f3608c15c5de2f577a2220ce124b530825717d778f1e3941e536a3ab691f733
SHA512 c270a622d7887f4c97232ea898f5380459c565817f0d201cdb081ee82e3002b6e6248753a68da896d3b1327f93e8e8cb0ca0dcaeef324f610e0a1c7b542c6492

C:\Users\Admin\AppData\Local\Temp\_MEI4562\_lzma.pyd

MD5 7261093f9b03b18ca9c932ae27ebf376
SHA1 3d87cf179adf9291fa5dae6a8a525f47fd26ff9c
SHA256 436113d6aa749f9e3332248b6aaf35bd7b9f20c0acb2fe8bc3063ce43c5f68c2
SHA512 ff0f67b7114cdb251207099053610a9e12cfc4fc7482474bba7ad1912fdfea1a45d122c8e9a7815f8e9f4fc9054dc106bcbd2b53e4bee2c87a0a9b35bb78b11a

C:\Users\Admin\AppData\Local\Temp\_MEI4562\_bz2.pyd

MD5 ca879a65cc4cf6713b993d7931463fac
SHA1 e693f1583f093c5db67510bc6fe5aa713b056ccd
SHA256 53414d8433d46d335212e57394facd9b4d0adcbcafe29d7e694c6501c3fc1988
SHA512 44121fb79024356a5cffd62d3acaf5d7429fc777c8328648ce772aff2a856b973fa960c65b0acdd865796e9387a121e94cd9a43f7b10616b78b0697d96e83cdd

C:\Users\Admin\AppData\Local\Temp\_MEI4562\python3.dll

MD5 a9c5b205eb2dd5bb82e1bc46b71e3a21
SHA1 7f37785f277368d75df916b2a6b40b83443f4ee8
SHA256 88d1eef72d4cf1e43701f86ae17a93dbca4abaa6e7c57ed0c6f328538e31d710
SHA512 69e126e1684e36eb1c2ffd5c6b91ab2eed8908ad98d716bcafac3a0f5594a58619a832673ad07f1bd0ad010c32e9d7e5946819b4cc52529318258f9edd75fa5e

memory/3308-268-0x00007FFB30730000-0x00007FFB30993000-memory.dmp

memory/3308-270-0x00007FFB2F470000-0x00007FFB2F9B1000-memory.dmp

memory/3308-269-0x00007FFB2FC70000-0x00007FFB30160000-memory.dmp

memory/3308-273-0x000001F5BDB40000-0x000001F5BDB50000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-19 13:40

Reported

2024-06-19 13:44

Platform

win11-20240508-en

Max time kernel

145s

Max time network

151s

Command Line

C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe -d

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: 33 N/A C:\Windows\system32\AUDIODG.EXE N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\system32\AUDIODG.EXE N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe

C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe -d

C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe

C:\Users\Admin\AppData\Local\Temp\DBDRegion.exe -d

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x00000000000004BC 0x00000000000004C0

Network

Country Destination Domain Proto
US 8.8.8.8:53 docs.aws.amazon.com udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI45042\ucrtbase.dll

MD5 0e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA1 4189f4459c54e69c6d3155a82524bda7549a75a6
SHA256 8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512 a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

C:\Users\Admin\AppData\Local\Temp\_MEI45042\python310.dll

MD5 efe2d90cc0e7b8741109513e28bcd62a
SHA1 0f3076290f70a3b6646376a48a95709b1967f8d7
SHA256 b174d52c48323281b4c71881b77e67c7b38a430b9ee3e1c33ed8468eb80cce37
SHA512 6051a1b244f6980030cec4408480f8f910770ae0f1122fe1f8a373add76fce63acaae987889c65587939a769ba07aa62c9aadbb396cab6b648fa4d25e179fcb7

C:\Users\Admin\AppData\Local\Temp\_MEI45042\zlib.dll

MD5 d00d9d7b9e0215553c30bb974009356b
SHA1 4608882531ad0c106732682cbe746d911c38fc9a
SHA256 54c755e6b90499a5ef49a65ce9472535286fe4db3565a06c4a53f8a4833532dc
SHA512 8795959cdd8525b449193b90cebe81e8ae7876858a6cc706a255c6d2af5696be92e1dc93ef34551b4888b51c1f5dce920d834ef6ff8f8f4693cd4433e488dc56

C:\Users\Admin\AppData\Local\Temp\_MEI45042\base_library.zip

MD5 6dbdd4d0d703a952f340bc7ec651e946
SHA1 78454cb350e9128d8571aa09028f6dafe353babd
SHA256 116ddbb8c337b18480478e3cf75cf457e3dae1eb35c4986559d1075af29ddb89
SHA512 d63c3bea11bc80bceb3bb800d964205f8211e203e84fd2c36d1565a770002fe11971bf44efc85bf620fd8431690538f310990f9a79ac5c2b66019378b153e04b

C:\Users\Admin\AppData\Local\Temp\_MEI45042\_ctypes.pyd

MD5 7b0d084a34e97a0c965c638f154ceb50
SHA1 efe50cfee0a977131bb320ad36ec67572ab32a3e
SHA256 b03acf0932a63396b9c24d4e8a89cfb45fa4073dac2242b0082fd55d1a116e80
SHA512 bb4343db58f6bc41dbde3d54f88060279c3ecee295d2f4b858b97ca39206a7a9960ba25462608c434ba865cd0c0b805eeb54f357ed740611fde1954c3359acc3

C:\Users\Admin\AppData\Local\Temp\_MEI45042\ffi.dll

MD5 0f18bcbeb2da9ceb5eb5c6f3f9113fe9
SHA1 0a0dba0a23a48f117480d63fee0fa61e39ae39ca
SHA256 4ec927d13273dd1a5ffd6b42151e9ff097ca8b07a169b697496c98ce457ca913
SHA512 1cd99d0effb44f5dacc2eb5107162886e31acc5f5cff7484f2c949d95562d54cc200189990d33ebb15c5c012f5514e473cabcab66373c76e6db6e7d76623ff05

C:\Users\Admin\AppData\Local\Temp\_MEI45042\LIBBZ2.dll

MD5 9ecb733cf14bbff80b005ddb38540497
SHA1 2f725f35a6602dc6a70a8339e90721d9e37dadb4
SHA256 e4ba6a29fe1611815b74da3fd55bd657564edafac7a9907b0819ff8fb091eed5
SHA512 1dc0e845b47483faca748efa6ed956570c0d00c5909f3b25200d653b5c42a1f0086426ce1f483af32c36ec83043fa8cfd1577f3823568f9faeafe438f41b9a40

C:\Users\Admin\AppData\Local\Temp\_MEI45042\liblzma.dll

MD5 ca72943b95ece5777b3a32e057637210
SHA1 5d4e0de09be53043fba47d8f0acbc9f0707952cf
SHA256 ffdb2b23d1bb49dbdbab5a43328d0eeaf6b685ecd60de09dca97e5b30be3795d
SHA512 58e304346b7141cdbf5936b2e4a5746ae134da222beeb02a288b7eb5b19861d1c77d73a13d74505e87c4b5c94d78ca327098944025102f0a18c07c21ea976d74

C:\Users\Admin\AppData\Local\Temp\_MEI45042\MSVCP140.dll

MD5 e74caf5d94aa08d046a44ed6ed84a3c5
SHA1 ed9f696fa0902a7c16b257da9b22fb605b72b12e
SHA256 3dedef76c87db736c005d06a8e0d084204b836af361a6bd2ee4651d9c45675e8
SHA512 d3128587bc8d62e4d53f8b5f95eb687bc117a6d5678c08dc6b59b72ea9178a7fd6ae8faa9094d21977c406739d6c38a440134c1c1f6f9a44809e80d162723254

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-crt-utility-l1-1-0.dll

MD5 54f27114eb0fda1588362bb6b5567979
SHA1 eaa07829d012206ac55fb1af5cc6a35f341d22be
SHA256 984306a3547be2f48483d68d0466b21dda9db4be304bedc9ffdb953c26cac5a1
SHA512 18d2bdce558655f2088918241efdf9297dfe4a14a5d8d9c5be539334ae26a933b35543c9071cedada5a1bb7c2b20238e9d012e64eb5bbf24d0f6b0b726c0329d

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-crt-time-l1-1-0.dll

MD5 6b33b34888ccecca636971fbea5e3de0
SHA1 ee815a158baacb357d9e074c0755b6f6c286b625
SHA256 00ac02d39b7b16406850e02ca4a6101f45d6f7b4397cc9e069f2ce800b8500b9
SHA512 f52a2141f34f93b45b90eb3bbcdb64871741f2bd5fed22eaaf35e90661e8a59eba7878524e30646206fc73920a188c070a38da9245e888c52d25e36980b35165

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-crt-string-l1-1-0.dll

MD5 96da689947c6e215a009b9c1eca5aec2
SHA1 7f389e6f2d6e5beb2a3baf622a0c0ea24bc4de60
SHA256 885309eb86dccd8e234ba05e13fe0bf59ab3db388ebfbf6b4fd6162d8e287e82
SHA512 8e86fa66a939ff3274c2147463899df575030a575c8f01573c554b760a53b339127d0d967c8cf1d315428e16e470fa1cc9c2150bb40e9b980d4ebf32e226ee89

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-crt-stdio-l1-1-0.dll

MD5 76e0a89c91a28cf7657779d998e679e5
SHA1 982b5da1c1f5b9d74af6243885bcba605d54df8c
SHA256 0189cbd84dea035763a7e52225e0f1a7dcec402734885413add324bffe688577
SHA512 d75d8798ea3c23b3998e8c3f19d0243a0c3a3262cffd8bcee0f0f0b75f0e990c9ce6644150d458e5702a8aa51b202734f7a9161e795f8121f061139ad2ea454f

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-crt-runtime-l1-1-0.dll

MD5 8b9b0d1c8b0e9d4b576d42c66980977a
SHA1 a19acefa3f95d1b565650fdbc40ef98c793358e9
SHA256 371a44ab91614a8c26d159beb872a7b43f569cb5fac8ada99ace98f264a3b503
SHA512 4b1c5730a17118b7065fada3b36944fe4e0260f77676b84453ee5042f6f952a51fd99debca835066a6d5a61ba1c5e17247551340dd02d777a44bc1cae84e6b5f

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-crt-process-l1-1-0.dll

MD5 595d79870970565be93db076afbe73b5
SHA1 ec96f7beeaec14d3b6c437b97b4a18a365534b9b
SHA256 fc50a37acc35345c99344042d7212a4ae88aa52a894cda3dcb9f6db46d852558
SHA512 152849840a584737858fc5e15f0d7802786e823a13ec5a9fc30ee032c7681deaf11c93a8cffead82dc5f73f0cd6f517f1e83b56d61d0e770cbb20e1cfff22840

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-crt-multibyte-l1-1-0.dll

MD5 4e033cfee32edf6be7847e80a5114894
SHA1 91eef52c557aefd0fde27e8df4e3c3b7f99862f2
SHA256 dff24441df89a02dde1cd984e4d3820845bafdff105458ed10d510126117115b
SHA512 e1f3d98959d68ef3d7e86ac4cb3dbdf92a34fcfd1bf0e0db45db66c65af0162ab02926dc5d98c6fc4a759a6010026ee26a9021c67c0190da941a04b783055318

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-crt-math-l1-1-0.dll

MD5 4dd7a61590d07500704e7e775255cb00
SHA1 8b35ec4676bd96c2c4508dc5f98ca471b22deed7
SHA256 a25d0654deb0cea1aef189ba2174d0f13bdf52f098d3a9ec36d15e4bfb30c499
SHA512 1086801260624cf395bf971c9fd671abddcd441ccc6a6eac55f277ccfbab752c82cb1709c8140de7b4b977397a31da6c9c8b693ae92264eb23960c8b1e0993bd

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-crt-locale-l1-1-0.dll

MD5 ab206f2943977256ca3a59e5961e3a4f
SHA1 9c1df49a8dbdc8496ac6057f886f5c17b2c39e3e
SHA256 b3b6ee98aca14cf5bc9f3bc7897bc23934bf85fc4bc25b7506fe4cd9a767047a
SHA512 baccc304b091a087b2300c10f6d18be414abb4c1575274c327104aabb5fdf975ba26a86e423fda6befb5d7564effac0c138eb1bad2d2e226131e4963c7aac5bd

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-crt-heap-l1-1-0.dll

MD5 f9e20dd3b07766307fccf463ab26e3ca
SHA1 60b4cf246c5f414fc1cd12f506c41a1043d473ee
SHA256 af47aebe065af2f045a19f20ec7e54a6e73c0c3e9a5108a63095a7232b75381a
SHA512 13c43eee9c93c9f252087cb397ff2d6b087b1dc92a47ba5493297f080e91b7c39ee5665d6bdc1a80e7320e2b085541fc798a3469b1f249b05dee26bbbb6ab706

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-crt-filesystem-l1-1-0.dll

MD5 f0d507de92851a8c0404ac78c383c5cd
SHA1 78fa03c89ea12ff93fa499c38673039cc2d55d40
SHA256 610332203d29ab218359e291401bf091bb1db1a6d7ed98ab9a7a9942384b8e27
SHA512 a65c9129ee07864f568c651800f6366bca5313ba400814792b5cc9aa769c057f357b5055988c414e88a6cd87186b6746724a43848f96a389a13e347ef5064551

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-crt-environment-l1-1-0.dll

MD5 c712515d052a385991d30b9c6afc767f
SHA1 9a4818897251cacb7fe1c6fe1be3e854985186ad
SHA256 f7c6c7ea22edd2f8bd07aa5b33cbce862ef1dcdc2226eb130e0018e02ff91dc1
SHA512 b7d1e22a169c3869aa7c7c749925a031e8bdd94c2531c6ffe9dae3b3cd9a2ee1409ca26824c4e720be859de3d4b2af637dd60308c023b4774d47afe13284dcd2

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-crt-convert-l1-1-0.dll

MD5 d53637eab49fe1fe1bd45d12f8e69c1f
SHA1 c84e41fdcc4ca89a76ae683cb390a9b86500d3ca
SHA256 83678f181f46fe77f8afe08bfc48aebb0b4154ad45b2efe9bfadc907313f6087
SHA512 94d43da0e2035220e38e4022c429a9c049d6a355a9cb4695ad4e0e01d6583530917f3b785ea6cd2592fdd7b280b9df95946243e395a60dc58ec0c94627832aeb

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-crt-conio-l1-1-0.dll

MD5 6c88d0006cf852f2d8462dfa4e9ca8d1
SHA1 49002b58cb0df2ee8d868dec335133cf225657df
SHA256 d5960c7356e8ab97d0ad77738e18c80433da277671a6e89a943c7f7257ff3663
SHA512 d081843374a43d2e9b33904d4334d49383df04ee7143a8b49600841ece844eff4e8e36b4b5966737ac931ed0350f202270e043f7003bf2748c5418d5e21c2a27

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-util-l1-1-0.dll

MD5 a1952875628359a0632be61ba4727684
SHA1 1e1a5ab47e4c2b3c32c81690b94954b7612bb493
SHA256 a41bede183fa1c70318332d6bc54ef13817aeee6d52b3ab408f95fa532b809f1
SHA512 3f86180cc085dc8c9f6d3c72f5ccc0f5a0c9048343edaf62239eb4b038799845388898408ed7e8eac5d015a9bc42ff428f74585f64f5d3467dddb1303baf4f03

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-timezone-l1-1-0.dll

MD5 f62b66f451f2daa8410ad62d453fa0a2
SHA1 4bf13db65943e708690d6256d7ddd421cc1cc72b
SHA256 48eb5b52227b6fb5be70cb34009c8da68356b62f3e707db56af957338ba82720
SHA512 d64c2a72adf40bd451341552e7e6958779de3054b0cf676b876c3ba7b86147aecba051ac08adc0c3bfb2779109f87dca706c43de3ce36e05af0ddee02bbbf419

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-sysinfo-l1-1-0.dll

MD5 df50047bbd2cf3a4b0cf0567514b464c
SHA1 f20ae25484a1c1b43748a1f0c422f48f092ad2c1
SHA256 8310d855398f83cb5b9ca3adeb358da1354557aec5c82c8ef91a29f79a47f620
SHA512 5c3bfc2ccb2ee864b99f6709677474327e85889f4c962ea0a1ef9e1e876dc88b1d8e8e0f6c1422f634ff1c84a861c34e52ee07dac7fdde505b508bea80562b9f

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-synch-l1-2-0.dll

MD5 47388f3966e732706054fe3d530ed0dc
SHA1 a9aebbbb73b7b846b051325d7572f2398f5986ee
SHA256 59c14541107f5f2b94bbf8686efee862d20114bcc9828d279de7bf664d721132
SHA512 cce1fc5bcf0951b6a76d456249997b427735e874b650e5b50b3d278621bf99e39c4fc7fee081330f20762f797be1b1c048cb057967ec7699c9546657b3e248ee

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-synch-l1-1-0.dll

MD5 6961bf5622ffcd14c16fbfc1296950a4
SHA1 5584c189216a17228cca6cd07037aaa9a8603241
SHA256 50a1542d16b42ecb3edc1edd0881744171ea52f7155e5269ad39234f0ea691de
SHA512 a4d0c15acbff4e9140ae4264fa24bd4c65fb2d1052a0b37bf281498f3b641fef563c18115511829a23340c9440f547028d36015ba38cbd51ad0744d44d5ccd87

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-string-l1-1-0.dll

MD5 b7cbc8d977a00a2574e110b01124ed40
SHA1 637e4a9946691f76e6deb69bdc21c210921d6f07
SHA256 854db7d2085caacf83d6616761d8bdcbacb54a06c9a9b171b1c1a15e7dc10908
SHA512 b415ef4092fa62d39941bf529a2032bc8b591c54ed2050ea4730f198899f147539b2c0e97f3c4f14848c71066924c1848ae5f07779a1a47ab4c5e46f02be7258

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-rtlsupport-l1-1-0.dll

MD5 2166fb99debbb1b0649c4685cf630a4a
SHA1 24f37d46dfc0ef303ef04abf9956241af55d25c9
SHA256 cdc4cfebf9cba85b0d3979befdb258c1f2cfcb79edd00da2dfbf389d080e4379
SHA512 de27d06b1f306110b42d0ed2642a555862d0ade7e56e5f2908e399f140aa5f43904e08d690bcb0d2f4d11d799ec18fa682db048da57d99cd99891e45add86371

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-profile-l1-1-0.dll

MD5 7028cf6b6b609cb0e31abd1f618e42d0
SHA1 e7e0b18a40a35bd8b0766ac72253de827432e148
SHA256 9e98b03a3ca1ebabdceb7ed9c0ceb4912bb68eb68f3e0df17f39c7a55fada31d
SHA512 d035ccfd0de316e64187c18e6e5b36e14f615f872c08740ec22ef2c12d592e37d78ab154202926a56ab01d669eb5870dff651280a882d6bf2a700c43dcd25ac2

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-processthreads-l1-1-1.dll

MD5 d699333637db92d319661286df7cc39e
SHA1 0bffb9ed366853e7019452644d26e8e8f236241b
SHA256 fe760614903e6d46a1be508dccb65cf6929d792a1db2c365fc937f2a8a240504
SHA512 6fa9ff0e45f803faf3eb9908e810a492f6f971cb96d58c06f408980ab40cba138b52d853aa0e3c68474053690dfafa1817f4b4c8fb728d613696b6c516fa0f51

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-processthreads-l1-1-0.dll

MD5 5faf9a33bab1d39dd9f820d34339b3d4
SHA1 50699041060d14576ed7bacbd44be9af80eb902a
SHA256 a1221836731c7e52c42d5809cc02b17c5ec964601631ec15a84201f423da4ac4
SHA512 73c25d1338df9aee5211fbb0e1b14e6bd853e31746c63bc46f44810622b09d52ee39b8e8a57c655da63d3d3d4025c2cba4d8673893d022417a2032ba3d935061

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-processenvironment-l1-1-0.dll

MD5 f3b4ab35a65a8d938c6b60ad59ba6e7f
SHA1 2745259f4dbbefbf6b570ee36d224abdb18719bc
SHA256 ea2972fec12305825162ae3e1ae2b6c140e840be0e7ebb51a7a77b7feeda133a
SHA512 a88afb66311494d6c15613c94555ba436cd2f75e11a49a448c9c6776dfba24cda25a44792a1e8b3e680c1ad3ad0574b43ac2328c6e41ff0832139c94b066dbf5

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-namedpipe-l1-1-0.dll

MD5 a056d4eeaae37deab8333dcc4c910a93
SHA1 cb59f1fe73c17446eb196fc0dd7d944a0cd9d81f
SHA256 593fa2aa2474508ad942bbaa0fdc9a1badd81c85b0dff1c43b90a47c23ad5fb7
SHA512 c2f811994182ef51d0c011c19336179da69357e5f284f787bcdb54f90c32768a959232a477534f7e62cd3d71a048a13e91b20042e2fe6ab108d606c7c8df9255

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-memory-l1-1-0.dll

MD5 6def20ed13972f3c3f08dba8ecf3d6cc
SHA1 9c03356cf48112563bb845479f40bf27b293e95e
SHA256 c2e887a17875d39099d662a42f58c120b9cc8a799afd87a9e49adf3faddd2b68
SHA512 5b4d2b1152bed14108dc58d358b1082e27defd1001d36cd72ec6f030a34d6caf9b01c3c1dd8a9ac66d1937fcf86a6fe3469ac93b1e76d933a8f4b51c1f782f65

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-localization-l1-2-0.dll

MD5 588bd2a8e0152e0918742c1a69038f1d
SHA1 9874398548891f6a08fc06437996f84eb7495783
SHA256 a07cc878ab5595aacd4ab229a6794513f897bd7ad14bcec353793379146b2094
SHA512 32ffe64c697f94c4db641ab3e20b0f522cf3eba9863164f1f6271d2f32529250292a16be95f32d852480bd1b59b8b0554c1e7fd7c7a336f56c048f4f56e4d62f

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-libraryloader-l1-1-0.dll

MD5 5d5fae1a17961d6ee37637f04fe99b8a
SHA1 47143a66b4a2e2ba019bf1fd07bcca9cfb8bb117
SHA256 8e01eb923fc453f927a7eca1c8aa5643e43b360c76b648088f51b31488970aa0
SHA512 9db32ec8416320dcb28f874b4679d2d47a5ae56317fdc9d2d65ebb553f1d6345c3dd0024294a671a694337683dd4e77254595a9cdbfe115c80d0ef53516d46aa

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-interlocked-l1-1-0.dll

MD5 39809cc5dabf769da8871a91a8ed9e69
SHA1 f779cdef9ded19402aa72958085213d6671ca572
SHA256 5cd00ff4731691f81ff528c4b5a2e408548107efc22cc6576048b0fdce3dfbc9
SHA512 83a8246839d28378c6f6951d7593dc98b6caa6dbca5fbd023b00b3b1a9eba0597943838c508493533c2de276c4d2f9107d890e1c9a493ee834351cff5dfd2cab

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-heap-l1-1-0.dll

MD5 cdc266896e0dbe6c73542f6dec19de23
SHA1 b4310929ccb82dd3c3a779cab68f1f9f368076f2
SHA256 87a5c5475e9c26fabfead6802dac8a62e2807e50e0d18c4bfadcb15ebf5bcbc0
SHA512 79a29041699f41938174a6ec9797faf8d6bf7764657d801cb3af15c225f8eab0135d59cfa627bd02dd7459f7b857d62299e4d082586ce690627ebdf1267ebb21

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-handle-l1-1-0.dll

MD5 cce27ff9b1e78b61955682788452f785
SHA1 a2e2a40cea25ea4fd64b8deaf4fbe4a2db94107a
SHA256 8ee2de377a045c52bbb05087ae3c2f95576edfb0c2767f40b13454f2d9f779de
SHA512 1fcec1cd70426e3895c48598dfc359839d2b3f2b1e3e94314872a866540353460ec932bf3841e5afe89aa4d6c6fac768e21ae368d68c2bb15f65960f6f5d7d5b

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-file-l2-1-0.dll

MD5 bfffa7117fd9b1622c66d949bac3f1d7
SHA1 402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2
SHA256 1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e
SHA512 b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-file-l1-2-0.dll

MD5 49c3ffd47257dbcb67a6be9ee112ba7f
SHA1 04669214375b25e2dc8a3635484e6eeb206bc4eb
SHA256 322d963d2a2aefd784e99697c59d494853d69bed8efd4b445f59292930a6b165
SHA512 bda5e6c669b04aaed89538a982ef430cef389237c6c1d670819a22b2a20bf3c22aef5cb4e73ef7837cbbd89d870693899f97cb538122059c885f4b19b7860a98

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-file-l1-1-0.dll

MD5 241338aef5e2c18c80fb1db07aa8bcdf
SHA1 9acbeef0ac510c179b319ca69cd5378d0e70504d
SHA256 56de091efe467fe23cc989c1ee21f3249a1bdb2178b51511e3bd514df12c5ccb
SHA512 b9fd37f01a58594e48fa566c41827b2b9499605d9e55c2178e83ee41c8c5f50a4df2c85efea94ca586ea0ea4a6d984ebb7ca2193e9306fcb853b147b2c76bc2d

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-errorhandling-l1-1-0.dll

MD5 a5883c68d432f593812ab3b755b808db
SHA1 51cbb7ba47802dc630c2507750432c55f5979c27
SHA256 b3715112a7ca4c6cc0efee044bd82444d3267a379e33a3ec118d87e75604204d
SHA512 27153e29e99a905fa4c8b3ede078644a3a3f29fdf7b98e387e39c5c60444e326c92afd74da8fee225f7ddf39724a0daef68ba238f3cc64fb7860172b8f29d79a

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-debug-l1-1-0.dll

MD5 9476affaac53e6e34405c4001f141805
SHA1 e7c8a6c29c3158f8b332eea5c33c3b1e044b5f73
SHA256 55574f9e80d313048c245acefd21801d0d6c908a8a5049b4c46253efaf420f89
SHA512 f8e3476a09d888caebd50da0ea2debc4006004e72af677919413655ab4595622cac524f1bc6c13406ee341ae0052a19ed83826ad530f652e73b2c65d4fa65680

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-datetime-l1-1-0.dll

MD5 16789cc09a417d7deb590fffe4ed02dc
SHA1 4940d5b92b6b80a40371f8df073bf3eb406f5658
SHA256 3b68d7ab0641de6b3e81d209b7c0d3896e4ffa76617bbadd01eb54036cdd1b07
SHA512 19e4f086cc2137ee60316b0736b3c6b3780578896df9a826edfe004bb74bee8e051c511a84d8a7ea278a5f47c82b9c955394f629ab0bb0740ecb51293d9be7b7

C:\Users\Admin\AppData\Local\Temp\_MEI45042\api-ms-win-core-console-l1-1-0.dll

MD5 e5912b05988259dad0d6d04c8a17d19b
SHA1 724f4f91041ad595e365b724a0348c83acf12bbb
SHA256 9f3608c15c5de2f577a2220ce124b530825717d778f1e3941e536a3ab691f733
SHA512 c270a622d7887f4c97232ea898f5380459c565817f0d201cdb081ee82e3002b6e6248753a68da896d3b1327f93e8e8cb0ca0dcaeef324f610e0a1c7b542c6492

C:\Users\Admin\AppData\Local\Temp\_MEI45042\_lzma.pyd

MD5 7261093f9b03b18ca9c932ae27ebf376
SHA1 3d87cf179adf9291fa5dae6a8a525f47fd26ff9c
SHA256 436113d6aa749f9e3332248b6aaf35bd7b9f20c0acb2fe8bc3063ce43c5f68c2
SHA512 ff0f67b7114cdb251207099053610a9e12cfc4fc7482474bba7ad1912fdfea1a45d122c8e9a7815f8e9f4fc9054dc106bcbd2b53e4bee2c87a0a9b35bb78b11a

C:\Users\Admin\AppData\Local\Temp\_MEI45042\_bz2.pyd

MD5 ca879a65cc4cf6713b993d7931463fac
SHA1 e693f1583f093c5db67510bc6fe5aa713b056ccd
SHA256 53414d8433d46d335212e57394facd9b4d0adcbcafe29d7e694c6501c3fc1988
SHA512 44121fb79024356a5cffd62d3acaf5d7429fc777c8328648ce772aff2a856b973fa960c65b0acdd865796e9387a121e94cd9a43f7b10616b78b0697d96e83cdd

C:\Users\Admin\AppData\Local\Temp\_MEI45042\python3.dll

MD5 a9c5b205eb2dd5bb82e1bc46b71e3a21
SHA1 7f37785f277368d75df916b2a6b40b83443f4ee8
SHA256 88d1eef72d4cf1e43701f86ae17a93dbca4abaa6e7c57ed0c6f328538e31d710
SHA512 69e126e1684e36eb1c2ffd5c6b91ab2eed8908ad98d716bcafac3a0f5594a58619a832673ad07f1bd0ad010c32e9d7e5946819b4cc52529318258f9edd75fa5e

C:\Users\Admin\AppData\Local\Temp\_MEI45042\VCRUNTIME140.dll

MD5 8697c106593e93c11adc34faa483c4a0
SHA1 cd080c51a97aa288ce6394d6c029c06ccb783790
SHA256 ff43e813785ee948a937b642b03050bb4b1c6a5e23049646b891a66f65d4c833
SHA512 724bbed7ce6f7506e5d0b43399fb3861dda6457a2ad2fafe734f8921c9a4393b480cdd8a435dbdbd188b90236cb98583d5d005e24fa80b5a0622a6322e6f3987

memory/3596-268-0x00007FFF971C0000-0x00007FFF97423000-memory.dmp

memory/3596-269-0x00007FFF96660000-0x00007FFF96B50000-memory.dmp

memory/3596-271-0x00007FFF957E0000-0x00007FFF95A45000-memory.dmp

memory/3596-270-0x00007FFF95A50000-0x00007FFF95F91000-memory.dmp

memory/3596-274-0x0000020605D60000-0x0000020605D70000-memory.dmp