Malware Analysis Report

2024-11-13 15:20

Sample ID 240730-wzpl6awfpe
Target Encryption Loader.exe
SHA256 222ccb7fe1404117e972904cd3160bb9b239e01e2daf3d4bb2fdf2c9037718e7
Tags
evasion execution persistence upx pyinstaller pysilon
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

222ccb7fe1404117e972904cd3160bb9b239e01e2daf3d4bb2fdf2c9037718e7

Threat Level: Known bad

The file Encryption Loader.exe was found to be: Known bad.

Malicious Activity Summary

evasion execution persistence upx pyinstaller pysilon

Detect Pysilon

Pysilon family

Enumerates VirtualBox DLL files

Command and Scripting Interpreter: PowerShell

Sets file to hidden

Executes dropped EXE

UPX packed file

Loads dropped DLL

Adds Run key to start application

Legitimate hosting services abused for malware hosting/C2

Unsigned PE

Detects Pyinstaller

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Views/modifies file attributes

Suspicious use of AdjustPrivilegeToken

Kills process with taskkill

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-07-30 18:21

Signatures

Detect Pysilon

Description Indicator Process Target
N/A N/A N/A N/A

Pysilon family

pysilon

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-30 18:21

Reported

2024-07-30 18:23

Platform

win11-20240709-en

Max time kernel

21s

Max time network

18s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe"

Signatures

Enumerates VirtualBox DLL files

Description Indicator Process Target
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Encryption Paid Free.exe = "C:\\Users\\Admin\\Encryption Paid Free.exe\\Encryption Paid Free.exe" C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1520 wrote to memory of 3416 N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe
PID 1520 wrote to memory of 3416 N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe
PID 3416 wrote to memory of 3984 N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3416 wrote to memory of 3984 N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3416 wrote to memory of 908 N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe C:\Windows\system32\cmd.exe
PID 3416 wrote to memory of 908 N/A C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe C:\Windows\system32\cmd.exe
PID 908 wrote to memory of 3192 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 908 wrote to memory of 3192 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 908 wrote to memory of 2308 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe
PID 908 wrote to memory of 2308 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe
PID 908 wrote to memory of 4368 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 908 wrote to memory of 4368 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 2308 wrote to memory of 5736 N/A C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe
PID 2308 wrote to memory of 5736 N/A C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe
PID 5736 wrote to memory of 5932 N/A C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5736 wrote to memory of 5932 N/A C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe

"C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe"

C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe

"C:\Users\Admin\AppData\Local\Temp\Encryption Loader.exe"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x00000000000004D4 0x00000000000004D8

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Encryption Paid Free.exe\""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Encryption Paid Free.exe\activate.bat""

C:\Windows\system32\attrib.exe

attrib +s +h .

C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe

"Encryption Paid Free.exe"

C:\Windows\system32\taskkill.exe

taskkill /f /im "Encryption Loader.exe"

C:\Users\Admin\Encryption Paid Free.exe\Encryption Paid Free.exe

"Encryption Paid Free.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Encryption Paid Free.exe\""

Network

Country Destination Domain Proto
US 8.8.8.8:53 23.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 39.58.20.217.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
N/A 127.0.0.1:53808 tcp
US 162.159.138.232:443 discord.com tcp
US 162.159.136.232:443 discord.com tcp
US 162.159.137.232:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.135.232:443 discord.com tcp
US 8.8.8.8:53 232.135.159.162.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI15202\wheel-0.43.0.dist-info\INSTALLER

MD5 365c9bfeb7d89244f2ce01c1de44cb85
SHA1 d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256 ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512 d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

C:\Users\Admin\AppData\Local\Temp\_MEI15202\ucrtbase.dll

MD5 a6b4fba258d519da313f7be057435ee4
SHA1 0bf414057d0749e9db4da7683eb6d11be174cdd5
SHA256 aa092722797b9a74e9463516e6c63d4d3c904ac263f4a4ea421b0d4d4875f606
SHA512 34f3d006a9bb7835e9d82465874e059a328c8d69abd61c79d6a85a7702df582dabc93126918a0514356fda2810c77acc1d6070ad4418921bd9e8efe34697e4a1

C:\Users\Admin\AppData\Local\Temp\_MEI15202\python312.dll

MD5 cfa2e5cdda9039831f12174573b20c7b
SHA1 c63a1ffd741a85e483fc01d6a2d0f7616b223291
SHA256 b93e682bddb5c3e2af1f0264e83fbc40481fe6abd90c3ab26e94f246c8ce8d7d
SHA512 f1ac568bd1a16d5ab2623ac42a83aed32d9867a0e016e0ac3c922f28ceb1bb7e114dab44553949008a6e2fd3bb67fc2be8fc283560d9f4b1f1552137a0c104aa

C:\Users\Admin\AppData\Local\Temp\_MEI15202\VCRUNTIME140.dll

MD5 be8dbe2dc77ebe7f88f910c61aec691a
SHA1 a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA256 4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA512 0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

memory/3416-1319-0x00007FF968730000-0x00007FF968E08000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI15202\base_library.zip

MD5 44db87e9a433afe94098d3073d1c86d7
SHA1 24cc76d6553563f4d739c9e91a541482f4f83e05
SHA256 2b8b36bd4b1b0ee0599e5d519a91d35d70f03cc09270921630168a386b60ac71
SHA512 55bc2961c0bca42ef6fb4732ec25ef7d7d2ec47c7fb96d8819dd2daa32d990000b326808ae4a03143d6ff2144416e218395cccf8edaa774783234ec7501db611

C:\Users\Admin\AppData\Local\Temp\_MEI15202\_ctypes.pyd

MD5 c685e7b6ef76cafc4ec106b9784b6cd6
SHA1 89038e7c2ea9a07796191689ea83c530f608a437
SHA256 5dc7f9409c83d146586d27c150534db326c52abfb499d6ba09d03f98259fa0a5
SHA512 ac10ef1ec237637c5b0459aff5925348d1d04dbf717ea2c5b75992b11ecb388bcc082ef113b3899e9bda7b1132e609a5c77b77492904e66e73be40d196bc3507

C:\Users\Admin\AppData\Local\Temp\_MEI15202\python3.DLL

MD5 4038af0427bce296ca8f3e98591e0723
SHA1 b2975225721959d87996454d049e6d878994cbf2
SHA256 a5bb3eb6fdfd23e0d8b2e4bccd6016290c013389e06daae6cb83964fa69e2a4f
SHA512 db762442c6355512625b36f112eca6923875d10aaf6476d79dc6f6ffc9114e8c7757ac91dbcd1fb00014122bc7f656115160cf5d62fa7fa1ba70bc71346c1ad3

memory/3416-1327-0x00007FF97AB30000-0x00007FF97AB55000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI15202\libffi-8.dll

MD5 013a0b2653aa0eb6075419217a1ed6bd
SHA1 1b58ff8e160b29a43397499801cf8ab0344371e7
SHA256 e9d8eb01bb9b02ce3859ba4527938a71b4668f98897d46f29e94b27014036523
SHA512 0bd13fa1d55133ee2a96387e0756f48133987bacd99d1f58bab3be7bffdf868092060c17ab792dcfbb4680f984f40d3f7cc24abdd657b756496aa8884b8f6099

C:\Users\Admin\AppData\Local\Temp\_MEI15202\_bz2.pyd

MD5 2eace32292e07ee5c0036b7392172f61
SHA1 5ca189cf84855d9b86865ade7060193acd560a93
SHA256 8c0571c2d937f8161626bb05acf6db121db399474be107467122b27b350310d8
SHA512 1257cbf7d1fbb5932d644b855c63dc5c31391af9d838115037aa583f119f4aac2a24da71f566039b13357af92c15275a933be311c13cd91d89dcfc272af7f1f6

memory/3416-1330-0x00007FF983F30000-0x00007FF983F3F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI15202\_lzma.pyd

MD5 03c89c56f917c131e6c08a222aae07b8
SHA1 1abc34d56b4cca58bf1d93463bbd27cf42d4d062
SHA256 dacc3b750b2c9d961064e3c7c35e46399405d8a2a544a6d243eb79a2b73338f4
SHA512 4a2087c7daf28b796ad6b3341d3c51226f490a4cf53f43ff230e7eaaa9af73d9b2eb6ba21465738008e996c2de66c78eaf8e655342edd382288197489fe32280

memory/3416-1333-0x00007FF97E240000-0x00007FF97E259000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-crt-runtime-l1-1-0.dll

MD5 5fc379b333e9d064513fd842ba6b01a4
SHA1 15196ba491dc9b0701b94323017a8ad9a466b6f4
SHA256 d16db9232ec6d06603e049ba8881cd15f1636c2a83c4e91a9f9abd8624b321e4
SHA512 70a2604cb3e9a4d9a167d0080b2ed7081cad6217fa8569223bca720624fea9cec68604712ac24ab301cddc6d71c01b5b1c581f67ac5e43a1826726471344302f

C:\Users\Admin\AppData\Local\Temp\_MEI15202\libopus-0.dll

MD5 3fb9d9e8daa2326aad43a5fc5ddab689
SHA1 55523c665414233863356d14452146a760747165
SHA256 fd8de9169ccf53c5968eec0c90e9ff3a66fb451a5bf063868f3e82007106b491
SHA512 f263ea6e0fab84a65fe3a9b6c0fe860919eee828c84b888a5aa52dea540434248d1e810a883a2aff273cd9f22c607db966dd8776e965be6d2cfe1b50a1af1f57

memory/3416-1382-0x00007FF97DA30000-0x00007FF97DA44000-memory.dmp

memory/3416-1381-0x00007FF97A960000-0x00007FF97A98D000-memory.dmp

memory/3416-1383-0x00007FF968200000-0x00007FF968722000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI15202\libogg-0.dll

MD5 0d65168162287df89af79bb9be79f65b
SHA1 3e5af700b8c3e1a558105284ecd21b73b765a6dc
SHA256 2ec2322aec756b795c2e614dab467ef02c3d67d527ad117f905b3ab0968ccf24
SHA512 69af81fd2293c31f456b3c78588bb6a372fe4a449244d74bfe5bfaa3134a0709a685725fa05055cfd261c51a96df4b7ebd8b9e143f0e9312c374e54392f8a2c2

C:\Users\Admin\AppData\Local\Temp\_MEI15202\libmodplug-1.dll

MD5 2bb2e7fa60884113f23dcb4fd266c4a6
SHA1 36bbd1e8f7ee1747c7007a3c297d429500183d73
SHA256 9319bf867ed6007f3c61da139c2ab8b74a4cb68bf56265a101e79396941f6d3b
SHA512 1ddd4b9b9238c1744e0a1fe403f136a1def8df94814b405e7b01dd871b3f22a2afe819a26e08752142f127c3efe4ebae8bfd1bd63563d5eb98b4644426f576b2

C:\Users\Admin\AppData\Local\Temp\_MEI15202\libjpeg-9.dll

MD5 c22b781bb21bffbea478b76ad6ed1a28
SHA1 66cc6495ba5e531b0fe22731875250c720262db1
SHA256 1eed2385030348c84bbdb75d41d64891be910c27fab8d20fc9e85485fcb569dd
SHA512 9b42cad4a715680a27cd79f466fd2913649b80657ff042528cba2946631387ed9fb027014d215e1baf05839509ca5915d533b91aa958ae0525dea6e2a869b9e4

C:\Users\Admin\AppData\Local\Temp\_MEI15202\libcrypto-3.dll

MD5 f8076a47c6f0dac4754d2a0186f63884
SHA1 d228339ff131fba16f023ec8fa40c658991eb01f
SHA256 3423134795ab8fce58190ae156d4b5d70053bebe6c9a228bea3281855e5357fa
SHA512 a6d4144cbba4a26edf563806696d312d8a3486122b165aae2c1692defc2828f3ff6bd6a7f24df730ff11c12bc60ac4408f9475c19b543ed1116b0a5d3466300b

C:\Users\Admin\AppData\Local\Temp\_MEI15202\freetype.dll

MD5 04a9825dc286549ee3fa29e2b06ca944
SHA1 5bed779bf591752bb7aa9428189ec7f3c1137461
SHA256 50249f68b4faf85e7cd8d1220b7626a86bc507af9ae400d08c8e365f9ab97cde
SHA512 0e937e4de6cbc9d40035b94c289c2798c77c44fc1dc7097201f9fab97c7ff9e56113c06c51693f09908283eda92945b36de67351f893d4e3162e67c078cff4ec

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-crt-utility-l1-1-0.dll

MD5 dd274d651970197e27feab08ce4b028d
SHA1 6664642754c808c3f90a07bdac130667640292ff
SHA256 9613e7e0e7abbb4fef8cfb509992382de6b42bf77c13d332f0c63cf607657645
SHA512 2e44a4cc4c270879f1fe2f0196273ce8b5ec501a3be367fccf0d2e314aa92ca5b61b38394970a82f3af1c7507d988b23a4888a572fa26fd5d1a41f6b864b3987

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-crt-time-l1-1-0.dll

MD5 7c33d39026d00829b6471b6553d58585
SHA1 d4540ce9ed17ac5d00fc88bdbfd9db024fc2aa27
SHA256 51c921caa246c20435d4ad5b0785dcb71879aa075ce7c2edf26a13f834e49f35
SHA512 76429a39f3a8e6e47a34bfe3cc1ae2e73386a81c06b851342d09de573c039ca136a78cd5575ac7ffb12ea3454bc33075fb8679e33edd9507bf6ffcefc7aa13e0

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-crt-string-l1-1-0.dll

MD5 3635ebce411c68d4a19345c2770392a2
SHA1 916f6a4991b8478be93036e6301700685bc91234
SHA256 eb137321cbaed6ac69d598d0f7292a742b341597abf8b450ef540856916f7233
SHA512 fec461681a4e827adc2797e09d86a80711fecc95bca64f11519a9af822bd972ff8cd63aea50aa68a3aa23eab4ef5d0c8591f0e8926f802e0cd665607d0659b1e

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-crt-stdio-l1-1-0.dll

MD5 f00c8e79700909c80a951b900cfae3b7
SHA1 9d41dadb0fba7ea16af40799991225c8f548aeea
SHA256 8a3d1982788c532604dbfa17171d71f8ad85880179e0a3e08c92dcf6536e5ed1
SHA512 033696e294e251cbbf6c8af6774141a1bf51f2056385610d310676e35f1849588f8280128ad090d94015adbc448136ab58486d554ac177e48598065cf64d6c59

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-crt-process-l1-1-0.dll

MD5 86b8122f87c75cc3dbb3845b16030c64
SHA1 ae65379a9a2312fc7eb58768860b75d0e83b0cc4
SHA256 c4d65f157ffd21f673ee6096952a0576b9d151b803199c3f930b82119c148f62
SHA512 e53a00b8788a865351898f316c307fe18ad2e2dca687b32d7a7f88b816918206e68fb90e4a87eb8cdab76183c975b70398eaba3bad049712eac519bcb2eb14fd

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-crt-private-l1-1-0.dll

MD5 3e07d85a5ced75f3fc2ec2d48fd45563
SHA1 c2594cbbd44a3b3542cab3e94239411b0bb6c233
SHA256 42921284fcff8f84543c4da8d7883e968324364541e008b57a10ce8781a4ccec
SHA512 df20e6f1f1ae1d72741a084ff1860b5db8e2535d01e46f5f8436dd3ec20249573ae52ea5f8990e4fa3f7f6d0fcd93ccae7bfa202628bd65dec34338fdb02b601

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-crt-math-l1-1-0.dll

MD5 9c6c9fe11c6b86bf31b1828331fbc90e
SHA1 fe18fe7e593e578fadb826df7b8e66aa80848963
SHA256 3308d7121df05de062333b772d91229ae13f626c5aad4255c025cbe5694bc1d8
SHA512 3d84434ce23038b713378a6e02d5f58b5e501bf2b4c3ffdb645a1600f386795b24931ad8dc1edc7dc0b00a69fd99f30567da32cb4c396c3800e29451fda1804c

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-crt-locale-l1-1-0.dll

MD5 1ce8dc500f8d647e45c5277186022b7a
SHA1 ab146c73f9294c7193a2973f2ed3cc9fcf641630
SHA256 396473df7b8645421a1e78358f4e5eefd90c3c64d1472b3bf90765a70847d5eb
SHA512 32b049156e820d8020325123f2e11c123b70573332e494834a2d648f89bca228d94b4ca5acf91dfdfcdd8444be37877c25881c972122dafb19fc43e5c39d1d04

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-crt-heap-l1-1-0.dll

MD5 fc617cea3a386409177b559099f22557
SHA1 d5291dbcb7a2458b34c8af9d539df4276a1d99ae
SHA256 9f6f171a5c1b0b7947fec31937d8b30789ae4fede08e78f6db2227f0fc22eb73
SHA512 bc3318c0382007895194397c1680cc308916d9ad1450d9e09e8e71f48772dcc890f4189da8c1ac498a75a9e6ac6a0a557f9812394aa4442e195e8039249543c8

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-crt-filesystem-l1-1-0.dll

MD5 712c104617ef0b2adcf6aa3a0117d7df
SHA1 14a158be1051a01637a5320b561bec004f672fe5
SHA256 8289c5306b1dd857e97275611864089986600439cac79babb2466fbc08254cb4
SHA512 62a7a0c5460859880f20ca8a80c5f0cc3f7fcbc00b51d1138e6e44dd988c4fdb5eab59eecc9bf74d1ecaccddb5dc0b35e0be709d8e2599a835aff157ef631ace

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-crt-environment-l1-1-0.dll

MD5 eaf1266b1b58d3228d9c8c6c51e61970
SHA1 28742ae8c761883ae391b72e6f78d65ce9fda5af
SHA256 b1e76699a66f81013ca416fb4d52499b060a00c0d30ff108243a42af2c528ac1
SHA512 5c73dc91be717164f2d519286c8cc46148204b5554bbf7f61e017f95eb1281bd2e906cf00564d1ae2bf68257ef28c069a4434d65c45e0ba5dc649068bdd31cfb

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-crt-convert-l1-1-0.dll

MD5 d8ad7429849045db1da31d30b545c6a0
SHA1 2d13798b365d06c085ea966d84cd3f127d1c7bc8
SHA256 a864aad44892a4735aef3ff76f594715291b74e8ab15fa3857f1d6168d4b7e3a
SHA512 522f7cef3b9bb32814fe35bdef8bf0a816a1db8f427d30039429ce3ba666ddfb8459a777f5dd796bfb816d8f454c5f9aff8cb015b66c87808aa5cd301fc995b0

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-crt-conio-l1-1-0.dll

MD5 018f9ce13d833d7830ee2d02239c1161
SHA1 4a544dc22706b999ceeb9477f027068630281075
SHA256 451e761abe2b6031574d02bd7b70a609c62d12757b9c2eebbcd815e66e5f2a4f
SHA512 7574f777508761e64a68cb19a56703987891d94c30622e9599fa132c72e687d55ce7f2822d2d6722132b80dc34dbed995d085573eddca8705cbd989605caa811

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-util-l1-1-0.dll

MD5 5c938aa1d32aada7336717a3bfe2cbad
SHA1 50ab7b54cfeefa470ea8d31d14cb18673c1e97a7
SHA256 edc5f6bb8cd3e74c0b065ebef81f6ea22050c585ffabfac93fa5594b22282b26
SHA512 ec01969aa1b4d62198765b670f1bb59aa42142f9a8ace1302e0fe49a43651ce96953babe44772d49040863f96fdfcc578fff1320f797351077209b9badc100ec

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-timezone-l1-1-0.dll

MD5 dd86613bbc3da5e41d8bd30803d87c1f
SHA1 35690b9b0fe48f045568e25221694be041f56d4f
SHA256 2312923d7e07c1f58f457ac434b89c01ce675ff42d74bb279326d6c573f675ed
SHA512 6d4a29c99e819368389a9347a719e78125dfbc3166af85425db81f38833b57ba28251472dd42db974876bcf8bc73465d638678b06e3482ceb36c19b943f41ca4

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-sysinfo-l1-1-0.dll

MD5 72ddeb5483ebf2b74bdf226fd907dfa4
SHA1 dcfabbeab02e3b2a6658afb422c5526b0588dd4e
SHA256 3c86ac8dd9c84d94e205f3a3751521ec88a4653b3f42a9fd8c724adabaacb316
SHA512 507d63174a38d70aecefb8117f21823040fe363949d0f1bf1253934debe7e0e775615efc8ac149022a074bb6e01314dfb62df550e04ea7b6e6241b7891f5717a

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-synch-l1-2-0.dll

MD5 a5c5e0015b39d058dd3ba707ddb2797d
SHA1 075d66ab5660b22b48129f7bcde7eaf24e6c3e65
SHA256 7eb43d2339d07858f4c95ea648234d44722e86262f1971ef5fa4995a1ca2e642
SHA512 86c0541e82c622a7d8ab74499d1ad56e76f270dc6bcf7d94cae3a7451b94c030bab172ad04b4f7b489d7f0649def9eea2512f8361d94ac4afa0fde3527656020

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-synch-l1-1-0.dll

MD5 dccb8e4632e84e12fdced9489e8db62f
SHA1 17d50eecc039c225965bcea198f83cca408ba5e0
SHA256 7e7fe561d2733b373cf74cb017a30c753c95ed312d3881bfee33e70ebec3abc1
SHA512 3661593b912d7b9c9b7b65d8465c492091ca036d634882e4db7dd7ea5e3500edde5997c13ba9d1a6d2695b9ae89eec505f304ad9759c0f73bd717fa9969e4a11

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-string-l1-1-0.dll

MD5 5f6e50a3235783de647ccbd5d20f1ce7
SHA1 c5af12af034df61e293f3262fbc31ee24c9df02e
SHA256 e54b9dfdda851d3e1afecdf9f88fc30bffc658a533f5dff362ea915dfa193c58
SHA512 ec9dafbf04606eaf641fb376a12e9e2415c83b7a6a2d348d1f54f8968204cac4b41620da96a6161a651ba782a4204eb7ab9e9540456b45f9445f7e104efbb84c

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-rtlsupport-l1-1-0.dll

MD5 1645c51ed436440b51ec2ab21596a953
SHA1 001bef9899617f0b961cc645ed85c30a0606f6bf
SHA256 eb6ead70e58b3d7bd40528a3944ce6389f3140622b1e264e216ee22aefc26689
SHA512 b50a134f1cc52e6395d702ac25e87de490ac4aa07300a785afbc066dfdd1b28acb112003b1725033075fc97d9ed9878bcdb0f3348795821dca2492f625390d8d

memory/3416-1384-0x00007FF97A7A0000-0x00007FF97A7B9000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-profile-l1-1-0.dll

MD5 bc5385bc13db467fa89b1ac8ba7fb486
SHA1 b44bd2eaa8fb086399125c0349a3e2102fc16154
SHA256 ffd90534607f02b049244fc4acdb8537c4d8a5c87a7d4e3fa0f3b82dad10bb66
SHA512 6653c716e1abd56136bce0252ab928b29c0f316973009c357fb458b414a6e652e4c9e74b0b3ca3c4b534c0186a20f2e4f97a8b1e1bba4883b91b21127c6f1e30

memory/3416-1385-0x00007FF97E510000-0x00007FF97E51D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-processthreads-l1-1-1.dll

MD5 0f99a725b93375f0ba8795e67e5a4fdf
SHA1 9825f0ec9cc4ba99471f4587d4bf97f7083d5f93
SHA256 be77a15dcaf73a7c1be6c62f57e79ef7bbc305e1b7753a4345ba1d88851dba08
SHA512 f95b6472b78f2bea732c6cc4933c83da7cbbf3eec67544b9faf86c6d6183c23e47afadb23e78420ed2dcec7ddde819e0fcb14345614c5acb3d959fca7c5a7468

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-processthreads-l1-1-0.dll

MD5 9d0f94055e51b559e47bc7124e8a9b54
SHA1 47d1fa7c3de9ca19e7dad7adee04ab5fb2dcb33c
SHA256 248e4c840c00327ed84edb13a75f826d0cbd412a288dab6bfa386476589053b3
SHA512 5e53c1ff3c2dde843507e00be0b66521c3d225d3fb405e8d52928706b2711ae189cf7488eb8b9e0fcd5419f93c0710c488e78ba0680ef47268817204a824827d

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-processenvironment-l1-1-0.dll

MD5 2a183a87968681d137d86be383c3f68c
SHA1 6d70085fc5f07d7f13ccd6591ac3c1179d4a2617
SHA256 5f6905a9b252c955c217a9d3ccfdd390ace9a2b5d0977447efb3a1ec643684db
SHA512 b2691eb6819785c535eab0798ff1442cbd5f485a9a2182c9a97fd6675a076783fb208979b463cb106ba15cdfb60d68dc0a7889aa6eb8bf5bd746015583e68362

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-namedpipe-l1-1-0.dll

MD5 301c2db0287d25844f0ed8119748f055
SHA1 5eaeff224c0f1dd5e801ea4fe5698233010d38b9
SHA256 44aeff16fcc3fa571e490b277c98dfa6352bc633de1ced8ab454a629655a8295
SHA512 3abb2fdddde2d08f38a0e22d3d61dfbf0990d7834ce80a55fb5c6fa68ae523bafab8ee7067c087a802f52fe8f506fe04d6b5b77d3b584cd519741524453c6f81

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-memory-l1-1-0.dll

MD5 c3fbc0bd499263dbc6761e7e34ca6e3d
SHA1 c6f6fc8f3d34b73d978090973fac912f5171a8cd
SHA256 ea438ac5926d5eb96999440dc890b24974926230c2a4b788c71ac765bdabd72d
SHA512 656da6d4a9717401ca8e31f5b62352c50a03f9e149cda2268295133c631600f6418758645f0f81fa596ddb3a9927b0759291ae64c9d330026a00b4cc3f6d1ab6

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-localization-l1-2-0.dll

MD5 09fed91680050e3149c29cf068bc10e5
SHA1 e9933b81c1d7b717f230ea98bb6bafbc1761ec4a
SHA256 3c5900c9e7fbada56e86d8973a582771dde6bff79ca80ae05920a33a2cc435df
SHA512 e514590385561731f2ad18afd6bcefac012ea8061a40b6ccfda4e45ff5768617b2e1b06e849e8a640a10ca59039e89ba88cac5d3b7ff088968eb4bc78e212d3a

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-libraryloader-l1-1-0.dll

MD5 cc56472bc6e4f1326a5128879ffe13cc
SHA1 636a4b3a13f1afff9e4eda1d2e6458e2b99221a7
SHA256 b4cf594dabb6c5255755a0b26a2ff5a2ac471818580f340f0432dbb758b34185
SHA512 baa0a6d83245f438548e2c546f89d2fb367d3492bec526324a9efb96accfa67602bc401211fc4574cb71377aaebee2ee9b13b562fcd3cf56fc983ae7faa12613

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-interlocked-l1-1-0.dll

MD5 2a3d1be9d329d76a89679f8cb461429f
SHA1 37716d8bdb2cfa84bedaad804979874ef50b6330
SHA256 21c91b58166c8066d5c85c97da82b496b45fa9ed3a1d6b76db85aa695a7cd772
SHA512 46230a42e282534fa4898bfc4271e5098856e446c505475e5226a4e5d95685ddc5fc029c20ba7129cb76ac5fb05ea0a449a092a4b546a00c060db0efb737958f

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-heap-l1-1-0.dll

MD5 51de1d1929921f8465fb92e884d675e0
SHA1 977e991fcf396f606ec06260d52e2d6ab39287cc
SHA256 ad09fbff3441c744c6a3c0acec7b0269f764ea7da6aa467911e812f042c6af15
SHA512 6c2efb80d1863e6a991fcd385f3276ec4f20215a99c1ce73947adc15c073d58405faebc229f29c4befba544438b8a9f38e5e2816ab708e3cfeee0d08327237d1

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-handle-l1-1-0.dll

MD5 d0f562394866e238d2df761bc4cce7be
SHA1 613c83d4efbc8306d2f776535fd60660e7f3b457
SHA256 6af859139a2873c8c7b681174ef620b13f71f3e879b39edaee66b20ae018ae4f
SHA512 7a2be6fe33b1fee83ec4072fe9e8ab36545d64fe2211a957d47516d8e71f9ddc6dc13b1aa3db0a3d9cb34c0eab023149a427172999c069b91cad4753eca42085

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-file-l2-1-0.dll

MD5 e1d37d21f7875483ae0d187032d5714c
SHA1 51a945a9e6ccf994781a028cd07ab8ee820f542c
SHA256 1076a19f2a42a35c8639fb1ce1666d046e0fd259142f7e645e350211d9d6390f
SHA512 77973d6e5e6ad68b304f50184a95be9d4993338f4f69e07c11275951b2fcfdc02c061182d1a7a394dc18fe77d6d021dd9e8e17cdfbbb8d0c77752c6df1979011

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-file-l1-2-0.dll

MD5 b38d5b15f77e6cd93763c76ff1bc79ee
SHA1 cadffe8a06835a7c1aa136a5515302d80d8e7419
SHA256 aa9e41933f1cf1c3bcc3b65771297b0ef088fac153c7997c0d48e7882714d05f
SHA512 46eaeb419654efd999146b9cd55ece42939e071f089ccb4698a09f4bb6b881106a3e342901439f867f609c1147ef151832b2919d2a33726643a6e5c4086a5f3a

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-file-l1-1-0.dll

MD5 1f22501f6bd7ebed5f96cfd0a5390d7f
SHA1 092eca4840f9de5e99f01290cc167cc2c07b0fc7
SHA256 198dd97c0edc412500e890400ea8d2890a6155766b85278e6e7602366d70a479
SHA512 a7a998dc379a0505827e1362eb409f1421dae65987387a78901255f1683f69f56a2d28c077f90eded1c9ed19e4c84564ddabeca284a8cc08275619250a9d5da4

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-fibers-l1-1-0.dll

MD5 49ca161ffc4094bd643adb65a03f6108
SHA1 0bc09cde835fbcf1e1056ad2ddc284f65a3c8b57
SHA256 d04306791507e0284b46b64b69c34ca9c238e270c039caeb0e96cf13b3b2cae2
SHA512 0a94f7c308b02feb72e3323e876702587b7dc56d7f786c3bffef2a6325144c59581a2b48fabc064e73e1d058d6b1f64061bddbd55970a330c7c658a24a81863d

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-errorhandling-l1-1-0.dll

MD5 95305ac137745d11c5805d162f3da695
SHA1 b80f1683a450834d14455dceffd10048ef0606f4
SHA256 35c5aaf1092e406db5cae36cb5a571b82936bfd333d84ccf672f7d8e72a86387
SHA512 fdbaef161e7d4cf4b905bda7a11a4b9033952d5a94c6bce8322732b16d9dca11634a54f28e1591da88a643fae635fa9c41c4e94bcca83f9ba7cf23730c119c2f

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-debug-l1-1-0.dll

MD5 451e40fad4a529da75abccdc9723a9a8
SHA1 e3ef32218a63c91b27ca2a24bc6ea8410677562c
SHA256 c55da85bc6a3c1fca3eab4c0fdb918d35b466b3aa86d2c28233d117bde3d36c5
SHA512 50135031cf10ce011a9595688bbb7b193611d253cc6586e9337321b61de8fef5f9cabb3a217113c6e71013ba40b6f7854640dff8749f4f8a0068be4e85a1908e

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-datetime-l1-1-0.dll

MD5 51a1bef712620a98219f7a1308523665
SHA1 30f6834d7a30af8c13c993f7ca9eda2f9c92a535
SHA256 12ab9012176def0e9ed6c19847a0dbb446b6a2575f534b0f1d9c3e1e2a6fcf72
SHA512 bcb36b2435536a92a4e7c3bd8c929796ddb317c728ca87ae1e641b093fe2f69fd7671b33d8526c165b598c8b79f78367ed93e3f08fcd6b9f9285caf867049dcd

C:\Users\Admin\AppData\Local\Temp\_MEI15202\api-ms-win-core-console-l1-1-0.dll

MD5 4db53fe4fa460e376722d1ef935c3420
SHA1 b17f050e749ca5b896a1bdafd54c6cd88d02ec5b
SHA256 041d2a89986d9ea14ce9b47083fd641e75bc34ee83b1f9b9e0070d0fa02fb4c6
SHA512 091d49696cfad5aa9e60eda148a09e4c1bfd84713eb56a06bb2c052b28e2e8cafa8d0a61a01d39a49e93444afaa85439f29360c52af7c3a0e3b53db1613c0b8d

memory/3416-1386-0x00007FF979C50000-0x00007FF979C83000-memory.dmp

memory/3416-1387-0x00007FF968130000-0x00007FF9681FD000-memory.dmp

memory/3416-1393-0x00007FF97AB30000-0x00007FF97AB55000-memory.dmp

memory/3416-1392-0x00007FF979D60000-0x00007FF979D87000-memory.dmp

memory/3416-1391-0x00007FF968010000-0x00007FF96812B000-memory.dmp

memory/3416-1390-0x00007FF97AAA0000-0x00007FF97AAAB000-memory.dmp

memory/3416-1389-0x00007FF97C270000-0x00007FF97C27D000-memory.dmp

memory/3416-1388-0x00007FF968730000-0x00007FF968E08000-memory.dmp

memory/3416-1398-0x00007FF979AF0000-0x00007FF979AFB000-memory.dmp

memory/3416-1397-0x00007FF979C20000-0x00007FF979C2C000-memory.dmp

memory/3416-1396-0x00007FF979C30000-0x00007FF979C3B000-memory.dmp

memory/3416-1395-0x00007FF979C40000-0x00007FF979C4B000-memory.dmp

memory/3416-1394-0x00007FF97A790000-0x00007FF97A79D000-memory.dmp

memory/3416-1401-0x00007FF9798D0000-0x00007FF9798DC000-memory.dmp

memory/3416-1400-0x00007FF9798E0000-0x00007FF9798EB000-memory.dmp

memory/3416-1399-0x00007FF9798F0000-0x00007FF9798FC000-memory.dmp

memory/3416-1415-0x00007FF9781E0000-0x00007FF9781EC000-memory.dmp

memory/3416-1414-0x00007FF970210000-0x00007FF970222000-memory.dmp

memory/3416-1413-0x00007FF970230000-0x00007FF970246000-memory.dmp

memory/3416-1412-0x00007FF973410000-0x00007FF97341C000-memory.dmp

memory/3416-1411-0x00007FF970250000-0x00007FF970262000-memory.dmp

memory/3416-1410-0x00007FF9781C0000-0x00007FF9781CD000-memory.dmp

memory/3416-1409-0x00007FF9781D0000-0x00007FF9781DC000-memory.dmp

memory/3416-1408-0x00007FF9781F0000-0x00007FF9781FB000-memory.dmp

memory/3416-1407-0x00007FF978200000-0x00007FF97820B000-memory.dmp

memory/3416-1406-0x00007FF9798A0000-0x00007FF9798AC000-memory.dmp

memory/3416-1405-0x00007FF9798B0000-0x00007FF9798BE000-memory.dmp

memory/3416-1404-0x00007FF9798C0000-0x00007FF9798CC000-memory.dmp

memory/3416-1403-0x00007FF968200000-0x00007FF968722000-memory.dmp

memory/3416-1417-0x00007FF96E180000-0x00007FF96E1A2000-memory.dmp

memory/3416-1416-0x00007FF96F090000-0x00007FF96F0A4000-memory.dmp

memory/3416-1402-0x00007FF97DA30000-0x00007FF97DA44000-memory.dmp

memory/3416-1418-0x00007FF979C50000-0x00007FF979C83000-memory.dmp

memory/3416-1422-0x00007FF967DF0000-0x00007FF967E3C000-memory.dmp

memory/3416-1424-0x00007FF967DB0000-0x00007FF967DCE000-memory.dmp

memory/3416-1423-0x00007FF967DD0000-0x00007FF967DE1000-memory.dmp

memory/3416-1421-0x00007FF96DD10000-0x00007FF96DD29000-memory.dmp

memory/3416-1420-0x00007FF96F070000-0x00007FF96F087000-memory.dmp

memory/3416-1419-0x00007FF968130000-0x00007FF9681FD000-memory.dmp

memory/3416-1426-0x00007FF967D10000-0x00007FF967D49000-memory.dmp

memory/3416-1425-0x00007FF967D50000-0x00007FF967DAD000-memory.dmp

memory/3416-1428-0x00007FF967CE0000-0x00007FF967D09000-memory.dmp

memory/3416-1427-0x00007FF97A790000-0x00007FF97A79D000-memory.dmp

memory/3416-1431-0x00007FF967B00000-0x00007FF967C76000-memory.dmp

memory/3416-1430-0x00007FF967C80000-0x00007FF967CA4000-memory.dmp

memory/3416-1429-0x00007FF967CB0000-0x00007FF967CDE000-memory.dmp

memory/3416-1432-0x00007FF967AE0000-0x00007FF967AF8000-memory.dmp

memory/3416-1437-0x00007FF967A50000-0x00007FF967A5B000-memory.dmp

memory/3416-1436-0x00007FF967A60000-0x00007FF967A6C000-memory.dmp

memory/3416-1435-0x00007FF967A70000-0x00007FF967A7B000-memory.dmp

memory/3416-1434-0x00007FF967A80000-0x00007FF967A8B000-memory.dmp

memory/3416-1433-0x00007FF96E180000-0x00007FF96E1A2000-memory.dmp

memory/3416-1442-0x00007FF967A10000-0x00007FF967A1C000-memory.dmp

memory/3416-1453-0x00007FF967CE0000-0x00007FF967D09000-memory.dmp

memory/3416-1452-0x00007FF967970000-0x00007FF96797C000-memory.dmp

memory/3416-1451-0x00007FF967980000-0x00007FF967992000-memory.dmp

memory/3416-1450-0x00007FF9679A0000-0x00007FF9679AD000-memory.dmp

memory/3416-1449-0x00007FF9679B0000-0x00007FF9679BC000-memory.dmp

memory/3416-1448-0x00007FF9679C0000-0x00007FF9679CC000-memory.dmp

memory/3416-1447-0x00007FF9679D0000-0x00007FF9679DB000-memory.dmp

memory/3416-1446-0x00007FF967DF0000-0x00007FF967E3C000-memory.dmp

memory/3416-1445-0x00007FF9679E0000-0x00007FF9679EB000-memory.dmp

memory/3416-1444-0x00007FF9679F0000-0x00007FF9679FC000-memory.dmp

memory/3416-1443-0x00007FF967A00000-0x00007FF967A0E000-memory.dmp

memory/3416-1441-0x00007FF967A20000-0x00007FF967A2C000-memory.dmp

memory/3416-1440-0x00007FF967A30000-0x00007FF967A3B000-memory.dmp

memory/3416-1439-0x00007FF967A40000-0x00007FF967A4C000-memory.dmp

memory/3416-1438-0x00007FF96F070000-0x00007FF96F087000-memory.dmp

memory/3416-1455-0x00007FF967930000-0x00007FF967965000-memory.dmp

memory/3416-1454-0x00007FF967C80000-0x00007FF967CA4000-memory.dmp

memory/3416-1456-0x00007FF967650000-0x00007FF967930000-memory.dmp

memory/3416-1457-0x00007FF967B00000-0x00007FF967C76000-memory.dmp

memory/3416-1458-0x00007FF965550000-0x00007FF967643000-memory.dmp

memory/3416-1459-0x00007FF965530000-0x00007FF965547000-memory.dmp

memory/3416-1460-0x00007FF965500000-0x00007FF965521000-memory.dmp

memory/3416-1461-0x00007FF9654D0000-0x00007FF9654F2000-memory.dmp

memory/3416-1462-0x00007FF9653C0000-0x00007FF9653F1000-memory.dmp

memory/3416-1463-0x00007FF965430000-0x00007FF9654C9000-memory.dmp

memory/3416-1464-0x00007FF965400000-0x00007FF965430000-memory.dmp

memory/3416-1465-0x00007FF965550000-0x00007FF967643000-memory.dmp

memory/3416-1467-0x00007FF964FE0000-0x00007FF965229000-memory.dmp

memory/3416-1466-0x00007FF965230000-0x00007FF9652E2000-memory.dmp

memory/3416-1472-0x00007FF965310000-0x00007FF96532C000-memory.dmp

memory/3416-1471-0x00007FF965330000-0x00007FF965349000-memory.dmp

memory/3416-1470-0x00007FF965350000-0x00007FF96536A000-memory.dmp

memory/3416-1469-0x00007FF965370000-0x00007FF9653B1000-memory.dmp

memory/3416-1468-0x00007FF964830000-0x00007FF964FD1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jny2xk40.wuk.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/3416-1534-0x00007FF967DD0000-0x00007FF967DE1000-memory.dmp

memory/3416-1533-0x00007FF967DF0000-0x00007FF967E3C000-memory.dmp

memory/3416-1532-0x00007FF96DD10000-0x00007FF96DD29000-memory.dmp

memory/3416-1531-0x00007FF96F070000-0x00007FF96F087000-memory.dmp

memory/3416-1530-0x00007FF96E180000-0x00007FF96E1A2000-memory.dmp

memory/3416-1529-0x00007FF96F090000-0x00007FF96F0A4000-memory.dmp

memory/3416-1528-0x00007FF970210000-0x00007FF970222000-memory.dmp

memory/3416-1527-0x00007FF970230000-0x00007FF970246000-memory.dmp

memory/3416-1526-0x00007FF973410000-0x00007FF97341C000-memory.dmp

memory/3416-1525-0x00007FF970250000-0x00007FF970262000-memory.dmp

memory/3416-1524-0x00007FF9781C0000-0x00007FF9781CD000-memory.dmp

memory/3416-1523-0x00007FF9781D0000-0x00007FF9781DC000-memory.dmp

memory/3416-1521-0x00007FF9781F0000-0x00007FF9781FB000-memory.dmp

memory/3416-1520-0x00007FF978200000-0x00007FF97820B000-memory.dmp

memory/3416-1519-0x00007FF9798A0000-0x00007FF9798AC000-memory.dmp

memory/3416-1518-0x00007FF9798B0000-0x00007FF9798BE000-memory.dmp

memory/3416-1517-0x00007FF9798C0000-0x00007FF9798CC000-memory.dmp

memory/3416-1516-0x00007FF9798D0000-0x00007FF9798DC000-memory.dmp

memory/3416-1515-0x00007FF9798E0000-0x00007FF9798EB000-memory.dmp

memory/3416-1514-0x00007FF9798F0000-0x00007FF9798FC000-memory.dmp

memory/3416-1512-0x00007FF979C20000-0x00007FF979C2C000-memory.dmp

memory/3416-1511-0x00007FF979C30000-0x00007FF979C3B000-memory.dmp

memory/3416-1510-0x00007FF979C40000-0x00007FF979C4B000-memory.dmp

memory/3416-1509-0x00007FF97A790000-0x00007FF97A79D000-memory.dmp

memory/3416-1508-0x00007FF968010000-0x00007FF96812B000-memory.dmp

memory/3416-1504-0x00007FF968130000-0x00007FF9681FD000-memory.dmp

memory/3416-1500-0x00007FF968200000-0x00007FF968722000-memory.dmp

memory/3416-1494-0x00007FF968730000-0x00007FF968E08000-memory.dmp

memory/3416-1496-0x00007FF983F30000-0x00007FF983F3F000-memory.dmp

memory/5736-4005-0x00007FF968980000-0x00007FF969058000-memory.dmp

memory/5736-4027-0x00007FF97A310000-0x00007FF97A31C000-memory.dmp

memory/5736-4026-0x00007FF97A320000-0x00007FF97A32B000-memory.dmp

memory/5736-4025-0x00007FF97A330000-0x00007FF97A33C000-memory.dmp

memory/5736-4024-0x00007FF97A340000-0x00007FF97A34B000-memory.dmp

memory/5736-4023-0x00007FF97A350000-0x00007FF97A35C000-memory.dmp

memory/5736-4022-0x00007FF97A360000-0x00007FF97A36B000-memory.dmp

memory/5736-4021-0x00007FF97A370000-0x00007FF97A37B000-memory.dmp

memory/5736-4020-0x00007FF97A790000-0x00007FF97A79D000-memory.dmp

memory/5736-4019-0x00007FF97A380000-0x00007FF97A49B000-memory.dmp

memory/5736-4018-0x00007FF97A4A0000-0x00007FF97A4C7000-memory.dmp

memory/5736-4017-0x00007FF97AAA0000-0x00007FF97AAAB000-memory.dmp

memory/5736-4016-0x00007FF97C270000-0x00007FF97C27D000-memory.dmp

memory/5736-4015-0x00007FF97A4D0000-0x00007FF97A59D000-memory.dmp

memory/5736-4014-0x00007FF97A5A0000-0x00007FF97A5D3000-memory.dmp

memory/5736-4013-0x00007FF97E510000-0x00007FF97E51D000-memory.dmp

memory/5736-4012-0x00007FF97A7A0000-0x00007FF97A7B9000-memory.dmp

memory/5736-4011-0x00007FF968450000-0x00007FF968972000-memory.dmp

memory/5736-4010-0x00007FF97DA30000-0x00007FF97DA44000-memory.dmp

memory/5736-4009-0x00007FF97A960000-0x00007FF97A98D000-memory.dmp

memory/5736-4008-0x00007FF97E240000-0x00007FF97E259000-memory.dmp

memory/5736-4007-0x00007FF983F30000-0x00007FF983F3F000-memory.dmp

memory/5736-4006-0x00007FF97AB30000-0x00007FF97AB55000-memory.dmp