Malware Analysis Report

2024-11-15 07:41

Sample ID 240802-t1a42swcrf
Target Arcane_External.exe
SHA256 85133b4dc5edc85709fdfb98f01c87a41798212ad552212e3f5583483489436f
Tags
pyinstaller pysilon evasion execution persistence upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

85133b4dc5edc85709fdfb98f01c87a41798212ad552212e3f5583483489436f

Threat Level: Known bad

The file Arcane_External.exe was found to be: Known bad.

Malicious Activity Summary

pyinstaller pysilon evasion execution persistence upx

Detect Pysilon

Pysilon family

Enumerates VirtualBox DLL files

Sets file to hidden

Command and Scripting Interpreter: PowerShell

Loads dropped DLL

UPX packed file

Executes dropped EXE

Legitimate hosting services abused for malware hosting/C2

Adds Run key to start application

Detects Pyinstaller

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Views/modifies file attributes

Kills process with taskkill

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: LoadsDriver

Suspicious use of WriteProcessMemory

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-02 16:31

Signatures

Detect Pysilon

Description Indicator Process Target
N/A N/A N/A N/A

Pysilon family

pysilon

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-02 16:30

Reported

2024-08-02 16:35

Platform

win11-20240802-en

Max time kernel

201s

Max time network

206s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe"

Signatures

Enumerates VirtualBox DLL files

Description Indicator Process Target
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\Windows Services\Windows Services.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\Windows Services\Windows Services.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\Windows Services\Windows Services.exe N/A
N/A N/A C:\Users\Admin\Windows Services\Windows Services.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services = "C:\\Users\\Admin\\Windows Services\\Windows Services.exe" C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\Windows Services\Windows Services.exe N/A

Suspicious behavior: LoadsDriver

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\Windows Services\Windows Services.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\Windows Services\Windows Services.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3976 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe
PID 3976 wrote to memory of 684 N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe
PID 684 wrote to memory of 2340 N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe C:\Windows\system32\cmd.exe
PID 684 wrote to memory of 2340 N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe C:\Windows\system32\cmd.exe
PID 684 wrote to memory of 2468 N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 684 wrote to memory of 2468 N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 684 wrote to memory of 4308 N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe C:\Windows\system32\cmd.exe
PID 684 wrote to memory of 4308 N/A C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe C:\Windows\system32\cmd.exe
PID 4308 wrote to memory of 456 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 4308 wrote to memory of 456 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 4308 wrote to memory of 716 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\Windows Services\Windows Services.exe
PID 4308 wrote to memory of 716 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\Windows Services\Windows Services.exe
PID 4308 wrote to memory of 3684 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 4308 wrote to memory of 3684 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 716 wrote to memory of 5548 N/A C:\Users\Admin\Windows Services\Windows Services.exe C:\Users\Admin\Windows Services\Windows Services.exe
PID 716 wrote to memory of 5548 N/A C:\Users\Admin\Windows Services\Windows Services.exe C:\Users\Admin\Windows Services\Windows Services.exe
PID 5548 wrote to memory of 1900 N/A C:\Users\Admin\Windows Services\Windows Services.exe C:\Windows\system32\cmd.exe
PID 5548 wrote to memory of 1900 N/A C:\Users\Admin\Windows Services\Windows Services.exe C:\Windows\system32\cmd.exe
PID 5548 wrote to memory of 772 N/A C:\Users\Admin\Windows Services\Windows Services.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 5548 wrote to memory of 772 N/A C:\Users\Admin\Windows Services\Windows Services.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe

"C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe"

C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe

"C:\Users\Admin\AppData\Local\Temp\Arcane_External.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x00000000000004E4 0x00000000000004E8

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Windows Services\""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Windows Services\activate.bat""

C:\Windows\system32\attrib.exe

attrib +s +h .

C:\Users\Admin\Windows Services\Windows Services.exe

"Windows Services.exe"

C:\Windows\system32\taskkill.exe

taskkill /f /im "Arcane_External.exe"

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc

C:\Users\Admin\Windows Services\Windows Services.exe

"Windows Services.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Windows Services\""

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DisplayEnhancementService

Network

Country Destination Domain Proto
US 8.8.8.8:53 cxcs.microsoft.net udp
GB 23.206.78.251:443 cxcs.microsoft.net tcp
GB 95.101.129.194:443 www.bing.com tcp
US 8.8.8.8:53 194.129.101.95.in-addr.arpa udp
US 162.159.128.233:443 discord.com tcp
US 162.159.135.232:443 discord.com tcp
N/A 127.0.0.1:53685 tcp
US 162.159.137.232:443 discord.com tcp
US 162.159.138.232:443 discord.com tcp
US 162.159.136.232:443 discord.com tcp
US 8.8.8.8:53 232.136.159.162.in-addr.arpa udp
GB 23.206.78.251:443 cxcs.microsoft.net tcp
GB 95.101.129.194:443 www.bing.com tcp
GB 95.101.129.194:443 www.bing.com tcp
GB 23.206.78.251:443 cxcs.microsoft.net tcp
GB 23.206.78.251:443 cxcs.microsoft.net tcp
GB 95.101.129.217:443 www.bing.com tcp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI39762\ucrtbase.dll

MD5 0e0bac3d1dcc1833eae4e3e4cf83c4ef
SHA1 4189f4459c54e69c6d3155a82524bda7549a75a6
SHA256 8a91052ef261b5fbf3223ae9ce789af73dfe1e9b0ba5bdbc4d564870a24f2bae
SHA512 a45946e3971816f66dd7ea3788aacc384a9e95011500b458212dc104741315b85659e0d56a41570731d338bdf182141c093d3ced222c007038583ceb808e26fd

C:\Users\Admin\AppData\Local\Temp\_MEI39762\VCRUNTIME140.dll

MD5 4585a96cc4eef6aafd5e27ea09147dc6
SHA1 489cfff1b19abbec98fda26ac8958005e88dd0cb
SHA256 a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736
SHA512 d78260c66331fe3029d2cc1b41a5d002ec651f2e3bbf55076d65839b5e3c6297955afd4d9ab8951fbdc9f929dbc65eb18b14b59bce1f2994318564eb4920f286

C:\Users\Admin\AppData\Local\Temp\_MEI39762\python311.dll

MD5 546cc5fe76abc35fdbf92f682124e23d
SHA1 5c1030752d32aa067b49125194befee7b3ee985a
SHA256 43bff2416ddd123dfb15d23dc3e99585646e8df95633333c56d85545029d1e76
SHA512 cb75334f2f36812f3a5efd500b2ad97c21033a7a7054220e58550e95c3408db122997fee70a319aef8db6189781a9f2c00a9c19713a89356038b87b036456720

memory/684-1307-0x00007FFD99030000-0x00007FFD99619000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI39762\base_library.zip

MD5 cca4934c1ef4ed49819d8ddb14616ddd
SHA1 eda75f624fe8de73ab928b4a950fd555a615247e
SHA256 a3d4cb2cfdb59bc0c4c30d7cbd4fd78394c4f1e8375fcaaa0995b470ab280ee9
SHA512 ab3073d23d5c741dad8b032114a45d3bc792483dcb463473b915f1fd72e693cebcfa04834fe2e6cf6c196dc09a10132e9df31c991e33686e183f84b8128426fc

C:\Users\Admin\AppData\Local\Temp\_MEI39762\python3.dll

MD5 b711598fc3ed0fe4cf2c7f3e0877979e
SHA1 299c799e5d697834aa2447d8a313588ab5c5e433
SHA256 520169aa6cf49d7ee724d1178de1be0e809e4bdcf671e06f3d422a0dd5fd294a
SHA512 b3d59eff5e38cef651c9603971bde77be7231ea8b7bdb444259390a8a9e452e107a0b6cb9cc93e37fd3b40afb2ba9e67217d648bfca52f7cdc4b60c7493b6b84

C:\Users\Admin\AppData\Local\Temp\_MEI39762\_ctypes.pyd

MD5 4d322ecdfec6fd9114af7febfeabd49a
SHA1 ae4527639a69e178d679251ca487b17130e9bd67
SHA256 633edc33259db27f9136ffa5ddfb4e824cc3fe0523464ca51aac978f56a6cd8d
SHA512 f610fec7fa09f003c44a905391a1ec231c7e1efe244b98c6a9c838d61b957e9ba3e436375a7c1f86069ae0094ad19a401c2c8cd465c03c1ec556ad452b0887e5

memory/684-1317-0x00007FFDA29F0000-0x00007FFDA29FF000-memory.dmp

memory/684-1316-0x00007FFDA1710000-0x00007FFDA1733000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI39762\libffi-8.dll

MD5 013a0b2653aa0eb6075419217a1ed6bd
SHA1 1b58ff8e160b29a43397499801cf8ab0344371e7
SHA256 e9d8eb01bb9b02ce3859ba4527938a71b4668f98897d46f29e94b27014036523
SHA512 0bd13fa1d55133ee2a96387e0756f48133987bacd99d1f58bab3be7bffdf868092060c17ab792dcfbb4680f984f40d3f7cc24abdd657b756496aa8884b8f6099

C:\Users\Admin\AppData\Local\Temp\_MEI39762\_bz2.pyd

MD5 847efeb4166ef379cdf030c605fa3889
SHA1 f8668295340c91170ba45d8539442727037e4f19
SHA256 a760d53f6e3fa01fa7aee66a10eb55ad1f10594966c6af97fb0c1c3e16a26a4a
SHA512 95f1fbde26a4df2a351edff10d72e2a20c80f9b60306199c11492e64e8cfc41d7c01ce9390d4e120657863228b42bf7e090053d9e4ec1be7abe7e50433b7125f

memory/684-1320-0x00007FFDA1EC0000-0x00007FFDA1ED9000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI39762\_lzma.pyd

MD5 13258372b5dfb02dbda211215fccb280
SHA1 cf4133e1ae68c8a68d89bc67bed768bb8c1072a4
SHA256 9f76f430165413110c9b4fa1d10cb37e883b3efa79b840aeedcef3df9e092676
SHA512 bfad643d2c06824b171ce299fe6d55db147171e7c2e3db1038bf5476ffad6c3ec05a8b024316a1d69f739f8f5cbbbc8bca1bfdfb1baa9481a5f2be36fa5138aa

memory/684-1323-0x00007FFD9CD10000-0x00007FFD9CD3D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI39762\crypto_clipper.json

MD5 ddda37d6bdc44e00a1a35cf0870d1eba
SHA1 81ff26059434580dc099402db537602c631cb283
SHA256 854174b0cd1ba3bb2b0270a6ee41427ad2cff23451188603d63a4ed75bf275f7
SHA512 d6e0453baf4c7cfdbfd344c0e41ff3dd800ea9ab03af2f7a97984ba58bfacb9872df64534612f18d115a363e1ecba4376eb24bf2a9ec3d88d40c09f995bd634a

C:\Users\Admin\AppData\Local\Temp\_MEI39762\libogg-0.dll

MD5 0d65168162287df89af79bb9be79f65b
SHA1 3e5af700b8c3e1a558105284ecd21b73b765a6dc
SHA256 2ec2322aec756b795c2e614dab467ef02c3d67d527ad117f905b3ab0968ccf24
SHA512 69af81fd2293c31f456b3c78588bb6a372fe4a449244d74bfe5bfaa3134a0709a685725fa05055cfd261c51a96df4b7ebd8b9e143f0e9312c374e54392f8a2c2

memory/684-1371-0x00007FFD98CB0000-0x00007FFD99028000-memory.dmp

memory/684-1370-0x00007FFDA16F0000-0x00007FFDA1704000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI39762\libmodplug-1.dll

MD5 2bb2e7fa60884113f23dcb4fd266c4a6
SHA1 36bbd1e8f7ee1747c7007a3c297d429500183d73
SHA256 9319bf867ed6007f3c61da139c2ab8b74a4cb68bf56265a101e79396941f6d3b
SHA512 1ddd4b9b9238c1744e0a1fe403f136a1def8df94814b405e7b01dd871b3f22a2afe819a26e08752142f127c3efe4ebae8bfd1bd63563d5eb98b4644426f576b2

C:\Users\Admin\AppData\Local\Temp\_MEI39762\libjpeg-9.dll

MD5 c22b781bb21bffbea478b76ad6ed1a28
SHA1 66cc6495ba5e531b0fe22731875250c720262db1
SHA256 1eed2385030348c84bbdb75d41d64891be910c27fab8d20fc9e85485fcb569dd
SHA512 9b42cad4a715680a27cd79f466fd2913649b80657ff042528cba2946631387ed9fb027014d215e1baf05839509ca5915d533b91aa958ae0525dea6e2a869b9e4

C:\Users\Admin\AppData\Local\Temp\_MEI39762\libcrypto-1_1.dll

MD5 164f1ca9781e832764f5184b8ecd3936
SHA1 314336f680fa6a2f5d077137242e93d3bbe1f95b
SHA256 3bdd29a6bc5d0be745e2a5c051d7e12d420f238386cd56d466a4965ae1722d9d
SHA512 839c06afb73d2b08205501e53a8900992befe658f57235593c6d593a2bea985be4c74cf440652ff97e6e85b1b89820531ed294e609747675c72a005f13ed8407

C:\Users\Admin\AppData\Local\Temp\_MEI39762\freetype.dll

MD5 04a9825dc286549ee3fa29e2b06ca944
SHA1 5bed779bf591752bb7aa9428189ec7f3c1137461
SHA256 50249f68b4faf85e7cd8d1220b7626a86bc507af9ae400d08c8e365f9ab97cde
SHA512 0e937e4de6cbc9d40035b94c289c2798c77c44fc1dc7097201f9fab97c7ff9e56113c06c51693f09908283eda92945b36de67351f893d4e3162e67c078cff4ec

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-crt-utility-l1-1-0.dll

MD5 9a3b4e5b18a946d6954f61673576fa11
SHA1 74206258cfd864f08e26ea3081d66297221b1d52
SHA256 ce74a264803d3e5761ed2c364e2196ac1b391cb24029af24aee8ef537ec68738
SHA512 da21178f2e7f4b15c28ae7cb0cc5891eaa3bdd0192042965861c729839983c7dcba9cfb96930b52dbe8a592b4713aa40762e54d846b8135456a09ae5bacbb727

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-crt-time-l1-1-0.dll

MD5 82e6d4ff7887b58206199e6e4be0feaf
SHA1 943e42c95562682c99a7ed3058ea734e118b0c44
SHA256 fb425bf6d7eb8202acd10f3fbd5d878ab045502b6c928ebf39e691e2b1961454
SHA512 ff774295c68bfa6b3c00a1e05251396406dee1927c16d4e99f4514c15ae674fd7ac5cadfe9bfffef764209c94048b107e70ac7614f6a8db453a9ce03a3db12e0

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-crt-string-l1-1-0.dll

MD5 cf115db7dcf92a69cb4fd6e2ae42fed5
SHA1 b39aa5eca6be3f90b71dc37a5ecf286e3ddca09a
SHA256 eb8fe2778c54213aa2cc14ab8cec89ebd062e18b3e24968aca57e1f344588e74
SHA512 8abd2754171c90bbd37ca8dfc3db6edaf57ccdd9bc4ce82aef702a5ce8bc9e36b593dc863d9a2abd3b713a2f0693b04e52867b51cd578977a4a9fde175dba97a

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-crt-stdio-l1-1-0.dll

MD5 9a7e2a550c64dabff61dad8d1574c79a
SHA1 8908de9d45f76764140687389bfaed7711855a2d
SHA256 db059947ace80d2c801f684a38d90fd0292bdaa1c124cd76467da7c4329a8a32
SHA512 70a6eb10a3c3bad45ba99803117e589bda741ecbb8bbdd2420a5ae981003aebe21e28cb437c177a3b23f057f299f85af7577fec9693d59a1359e5ffc1e8eaabd

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-crt-runtime-l1-1-0.dll

MD5 3ae4741db3ddbcb205c6acbbae234036
SHA1 5026c734dcee219f73d291732722691a02c414f2
SHA256 c26540e3099fa91356ee69f5058cf7b8aee63e23d6b58385476d1883e99033c3
SHA512 9dd5e12265da0f40e3c1432fb25fd19be594684283e961a2eaffd87048d4f892d075dcd049ab08aeee582542e795a0d124b490d321d7beb7963fd778ef209929

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-crt-process-l1-1-0.dll

MD5 ad586ea6ac80ac6309421deeea701d2f
SHA1 bc2419dff19a9ab3c555bc00832c7074ec2d9186
SHA256 39e363c47d4d45beda156cb363c5241083b38c395e4be237f3cfeda55176453c
SHA512 15c17cba6e73e2e2adb0e85af8ed3c0b71d37d4613d561ce0e818bdb2ca16862253b3cb291e0cf2475cedcb7ce9f7b4d66752817f61cf11c512869ef8dabc92a

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-crt-math-l1-1-0.dll

MD5 e9036fd8b4d476807a22cb2eb4485b8a
SHA1 0e49d745643f6b0a7d15ea12b6a1fe053c829b30
SHA256 bfc8ad242bf673bf9024b5bbe4158ca6a4b7bdb45760ae9d56b52965440501bd
SHA512 f1af074cce2a9c3a92e3a211223e05596506e7874ede5a06c8c580e002439d102397f2446ce12cc69c38d5143091443833820b902bb07d990654ce9d14e0a7f0

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-crt-private-l1-1-0.dll

MD5 f5f8baf06070974126e4586330ac705e
SHA1 f67c27891351d309bcba8e4b5231b1c58d84cf5d
SHA256 68b47c4813f203a47df432f5d5a2848275c239a5cd75d40e921369f1b029d9da
SHA512 b906b5c9eb3dba4813b74a3ad878798ddfbf69b7335c28d1da8a464e585ff5aeff42f0d658f97fe0d953f50deb7a625ee2010af3aa33b44926aedf7a4dd2fdde

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-crt-multibyte-l1-1-0.dll

MD5 3bbb672a2bf43fc51bedc039f7af0236
SHA1 39ae160a5e668fd08ed52dbebdec2de1de02c48f
SHA256 e5d3f2f18a33d6c296e64bec7161e961f10d2043bbbdc821610429c5684f34c6
SHA512 7c201c547e04c04fe43169fcb075e2e69ef526fb2ee54d08db237309859bbb0f6017b2deaa1ea002df4d78300c1267366987a31f1f6f61b9c7a8ef638d31f8ab

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-crt-locale-l1-1-0.dll

MD5 d8302fc8fac16f2afebf571a5ae08a71
SHA1 0c1aee698e2b282c4d19011454da90bb5ab86252
SHA256 b9ae70e8f74615ea2dc6fc74ec8371616e57c8eff8555547e7167bb2db3424f2
SHA512 cd2f4d502cd37152c4b864347fb34bc77509cc9e0e7fe0e0a77624d78cda21f244af683ea8b47453aa0fa6ead2a0b2af4816040d8ea7cdad505f470113322009

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-synch-l1-1-0.dll

MD5 6ea31229d13a2a4b723d446f4242425b
SHA1 036e888b35281e73b89da1b0807ea8e89b139791
SHA256 8eccaba9321df69182ee3fdb8fc7d0e7615ae9ad3b8ca53806ed47f4867395ae
SHA512 fa834e0e54f65d9a42ad1f4fb1086d26edfa182c069b81cff514feb13cfcb7cb5876508f1289efbc2d413b1047d20bab93ced3e5830bf4a6bb85468decd87cb6

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-crt-filesystem-l1-1-0.dll

MD5 931246f429565170bb80a1144b42a8c4
SHA1 e544fad20174cf794b51d1194fd780808f105d38
SHA256 a3ba0ee6a4abc082b730c00484d4462d16bc13ee970ee3eee96c34fc9b6ef8ed
SHA512 4d1d811a1e61a8f1798a617200f0a5ffbde9939a0c57b6b3901be9ca8445b2e50fc736f1dce410210965116249d77801940ef65d9440700a6489e1b9a8dc0a39

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-crt-environment-l1-1-0.dll

MD5 f983f25bf0ad58bcfa9f1e8fd8f94fcb
SHA1 27ede57c1a59b64db8b8c3c1b7f758deb07942e8
SHA256 a5c8c787c59d0700b5605925c8c255e5ef7902716c675ec40960640b15ff5aca
SHA512 ac797ff4f49be77803a3fe5097c006bb4806a3f69e234bf8d1440543f945360b19694c8ecf132ccfbd17b788afce816e5866154c357c27dfeb0e97c0a594c166

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-crt-convert-l1-1-0.dll

MD5 33b85a64c4af3a65c4b72c0826668500
SHA1 315ddb7a49283efe7fcae1b51ebd6db77267d8df
SHA256 8b24823407924688ecafc771edd9c58c6dbcc7de252e7ebd20751a5b9dd7abef
SHA512 b3a62cb67c7fe44ca57ac16505a9e9c3712c470130df315b591a9d39b81934209c8b48b66e1e18da4a5323785120af2d9e236f39c9b98448f88adab097bc6651

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-crt-conio-l1-1-0.dll

MD5 42ee890e5e916935a0d3b7cdee7147e0
SHA1 d354db0aac3a997b107ec151437ef17589d20ca5
SHA256 91d7a4c39baac78c595fc6cf9fd971aa0a780c297da9a8b20b37b0693bdcd42c
SHA512 4fae6d90d762ed77615d0f87833152d16b2c122964754b486ea90963930e90e83f3467253b7ed90d291a52637374952570bd9036c6b8c9eaebe8b05663ebb08e

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-util-l1-1-0.dll

MD5 427f0e19148d98012968564e4b7e622a
SHA1 488873eb98133e20acd106b39f99e3ebdfaca386
SHA256 0cbacaccedaf9b6921e6c1346de4c0b80b4607dacb0f7e306a94c2f15fa6d63d
SHA512 03fa49bdadb65b65efed5c58107912e8d1fccfa13e9adc9df4441e482d4b0edd6fa1bd8c8739ce09654b9d6a176e749a400418f01d83e7ae50fa6114d6aead2b

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-timezone-l1-1-0.dll

MD5 2554060f26e548a089cab427990aacdf
SHA1 8cc7a44a16d6b0a6b7ed444e68990ff296d712fe
SHA256 5ab003e899270b04abc7f67be953eaccf980d5bbe80904c47f9aaf5d401bb044
SHA512 fd4d5a7fe4da77b0222b040dc38e53f48f7a3379f69e2199639b9f330b2e55939d89ce8361d2135182b607ad75e58ee8e34b90225143927b15dcc116b994c506

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-sysinfo-l1-1-0.dll

MD5 9ca65d4fe9b76374b08c4a0a12db8d2f
SHA1 a8550d6d04da33baa7d88af0b4472ba28e14e0af
SHA256 8a1e56bd740806777bc467579bdc070bcb4d1798df6a2460b9fe36f1592189b8
SHA512 19e0d2065f1ca0142b26b1f5efdd55f874f7dde7b5712dd9dfd4988a24e2fcd20d4934bdda1c2d04b95e253aa1bee7f1e7809672d7825cd741d0f6480787f3b3

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-synch-l1-2-0.dll

MD5 dd6f223b4f9b84c6e9b2a7cf49b84fc7
SHA1 2ee75d635d21d628e8083346246709a71b085710
SHA256 8356f71c5526808af2896b2d296ce14e812e4585f4d0c50d7648bc851b598bef
SHA512 9c12912daea5549a3477baa2cd05180702cf24dd185be9f1fca636db6fbd25950c8c2b83f18d093845d9283c982c0255d6402e3cdea0907590838e0acb8cc8c1

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-file-l1-2-0.dll

MD5 bcb8b9f6606d4094270b6d9b2ed92139
SHA1 bd55e985db649eadcb444857beed397362a2ba7b
SHA256 fa18d63a117153e2ace5400ed89b0806e96f0627d9db935906be9294a3038118
SHA512 869b2b38fd528b033b3ec17a4144d818e42242b83d7be48e2e6da6992111758b302f48f52e0dd76becb526a90a2b040ce143c6d4f0e009a513017f06b9a8f2b9

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-string-l1-1-0.dll

MD5 84b1347e681e7c8883c3dc0069d6d6fa
SHA1 9e62148a2368724ca68dfa5d146a7b95c710c2f2
SHA256 1cb48031891b967e2f93fdd416b0324d481abde3838198e76bc2d0ca99c4fd09
SHA512 093097a49080aec187500e2a9e9c8ccd01f134a3d8dc8ab982e9981b9de400dae657222c20fb250368ecddc73b764b2f4453ab84756b908fcb16df690d3f4479

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-rtlsupport-l1-1-0.dll

MD5 772f1b596a7338f8ea9ddff9aba9447d
SHA1 cda9f4b9808e9cef2aeac2ac6e7cdf0e8687c4c5
SHA256 cc1bfce8fe6f9973cca15d7dfcf339918538c629e6524f10f1931ae8e1cd63b4
SHA512 8c94890c8f0e0a8e716c777431022c2f77b69ebfaa495d541e2d3312ae1da307361d172efce94590963d17fe3fcac8599dcabe32ab56e01b4d9cf9b4f0478277

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-profile-l1-1-0.dll

MD5 9082d23943b0aa48d6af804a2f3609a2
SHA1 c11b4e12b743e260e8b3c22c9face83653d02efe
SHA256 7ecc2e3fe61f9166ff53c28d7cb172a243d94c148d3ef13545bc077748f39267
SHA512 88434a2b996ed156d5effbb7960b10401831e9b2c9421a0029d2d8fa651b9411f973e988565221894633e9ffcd6512f687afbb302efe2273d4d1282335ee361d

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-processthreads-l1-1-1.dll

MD5 4380d56a3b83ca19ea269747c9b8302b
SHA1 0c4427f6f0f367d180d37fc10ecbe6534ef6469c
SHA256 a79c7f86462d8ab8a7b73a3f9e469514f57f9fe456326be3727352b092b6b14a
SHA512 1c29c335c55f5f896526c8ee0f7160211fd457c1f1b98915bcc141112f8a730e1a92391ab96688cbb7287e81e6814cc86e3b057e0a6129cbb02892108bfafaf4

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-processthreads-l1-1-0.dll

MD5 8e6eb11588fa9625b68960a46a9b1391
SHA1 ff81f0b3562e846194d330fadf2ab12872be8245
SHA256 ae56e19da96204e7a9cdc0000f96a7ef15086a9fe1f686687cb2d6fbcb037cd6
SHA512 fdb97d1367852403245fc82cb1467942105e4d9db0de7cf13a73658905139bb9ae961044beb0a0870429a1e26fe00fc922fbd823bd43f30f825863cad2c22cea

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-processenvironment-l1-1-0.dll

MD5 8711e4075fa47880a2cb2bb3013b801a
SHA1 b7ceec13e3d943f26def4c8a93935315c8bb1ac3
SHA256 5bcc3a2d7d651bb1ecc41aa8cd171b5f2b634745e58a8503b702e43aee7cd8c6
SHA512 7370e4acb298b2e690ccd234bd6c95e81a5b870ae225bc0ad8fa80f4473a85e44acc6159502085fe664075afa940cff3de8363304b66a193ac970ced1ba60aae

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-namedpipe-l1-1-0.dll

MD5 eaf36a1ead954de087c5aa7ac4b4adad
SHA1 9dd6bc47e60ef90794a57c3a84967b3062f73c3c
SHA256 cdba9dc9af63ebd38301a2e7e52391343efeb54349fc2d9b4ee7b6bf4f9cf6eb
SHA512 1af9e60bf5c186ced5877a7fa690d9690b854faa7e6b87b0365521eafb7497fb7370ac023db344a6a92db2544b5bdc6e2744c03b10c286ebbf4f57c6ca3722cf

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-memory-l1-1-0.dll

MD5 c4098d0e952519161f4fd4846ec2b7fc
SHA1 8138ca7eb3015fc617620f05530e4d939cafbd77
SHA256 51b2103e0576b790d5f5fdacb42af5dac357f1fd37afbaaf4c462241c90694b4
SHA512 95aa4c7071bc3e3fa4db80742f587a0b80a452415c816003e894d2582832cf6eac645a26408145245d4deabe71f00eccf6adb38867206bedd5aa0a6413d241f5

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-localization-l1-2-0.dll

MD5 20ddf543a1abe7aee845de1ec1d3aa8e
SHA1 0eaf5de57369e1db7f275a2fffd2d2c9e5af65bf
SHA256 d045a72c3e4d21165e9372f76b44ff116446c1e0c221d9cea3ab0a1134a310e8
SHA512 96dd48df315a7eea280ca3da0965a937a649ee77a82a1049e3d09b234439f7d927d7fb749073d7af1b23dadb643978b70dcdadc6c503fe850b512b0c9c1c78dd

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-libraryloader-l1-1-0.dll

MD5 8dfc224c610dd47c6ec95e80068b40c5
SHA1 178356b790759dc9908835e567edfb67420fbaac
SHA256 7b8c7e09030df8cdc899b9162452105f8baeb03ca847e552a57f7c81197762f2
SHA512 fe5be81bfce4a0442dd1901721f36b1e2efcdcee1fdd31d7612ad5676e6c5ae5e23e9a96b2789cb42b7b26e813347f0c02614937c561016f1563f0887e69bbee

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-interlocked-l1-1-0.dll

MD5 4f631924e3f102301dac36b514be7666
SHA1 b3740a0acdaf3fba60505a135b903e88acb48279
SHA256 e2406077621dce39984da779f4d436c534a31c5e863db1f65de5939d962157af
SHA512 56f9fb629675525cbe84a29d44105b9587a9359663085b62f3fbe3eea66451da829b1b6f888606bc79754b6b814ca4a1b215f04f301efe4db0d969187d6f76f1

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-heap-l1-1-0.dll

MD5 6168023bdb7a9ddc69042beecadbe811
SHA1 54ee35abae5173f7dc6dafc143ae329e79ec4b70
SHA256 4ea8399debe9d3ae00559d82bc99e4e26f310934d3fd1d1f61177342cf526062
SHA512 f1016797f42403bb204d4b15d75d25091c5a0ab8389061420e1e126d2214190a08f02e2862a2ae564770397e677b5bcdd2779ab948e6a3e639aa77b94d0b3f6c

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-handle-l1-1-0.dll

MD5 d584c1e0f0a0b568fce0efd728255515
SHA1 2e5ce6d4655c391f2b2f24fc207fdf0e6cd0cc2a
SHA256 3de40a35254e3e0e0c6db162155d5e79768a6664b33466bf603516f3743efb18
SHA512 c7d1489bf81e552c022493bb5a3cd95ccc81dbedaaa8fdc0048cacbd087913f90b366eeb4bf72bf4a56923541d978b80d7691d96dbbc845625f102c271072c42

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-file-l2-1-0.dll

MD5 bfffa7117fd9b1622c66d949bac3f1d7
SHA1 402b7b8f8dcfd321b1d12fc85a1ee5137a5569b2
SHA256 1ea267a2e6284f17dd548c6f2285e19f7edb15d6e737a55391140ce5cb95225e
SHA512 b319cc7b436b1be165cdf6ffcab8a87fe29de78f7e0b14c8f562be160481fb5483289bd5956fdc1d8660da7a3f86d8eede35c6cc2b7c3d4c852decf4b2dcdb7f

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-file-l1-1-0.dll

MD5 ea00855213f278d9804105e5045e2882
SHA1 07c6141e993b21c4aa27a6c2048ba0cff4a75793
SHA256 f2f74a801f05ab014d514f0f1d0b3da50396e6506196d8beccc484cd969621a6
SHA512 b23b78b7bd4138bb213b9a33120854249308bb2cf0d136676174c3d61852a0ac362271a24955939f04813cc228cd75b3e62210382a33444165c6e20b5e0a7f24

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-crt-heap-l1-1-0.dll

MD5 546da2b69f039da9da801eb7455f7ab7
SHA1 b8ff34c21862ee79d94841c40538a90953a7413b
SHA256 a93c8af790c37a9b6bac54003040c283bef560266aeec3d2de624730a161c7dc
SHA512 4a3c8055ab832eb84dd2d435f49b5b748b075bbb484248188787009012ee29dc4e04d8fd70110e546ce08d0c4457e96f4368802caee5405cff7746569039a555

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-errorhandling-l1-1-0.dll

MD5 f1534c43c775d2cceb86f03df4a5657d
SHA1 9ed81e2ad243965e1090523b0c915e1d1d34b9e1
SHA256 6e6bfdc656f0cf22fabba1a25a42b46120b1833d846f2008952fe39fe4e57ab2
SHA512 62919d33c7225b7b7f97faf4a59791f417037704eb970cb1cb8c50610e6b2e86052480cdba771e4fad9d06454c955f83ddb4aea2a057725385460617b48f86a7

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-debug-l1-1-0.dll

MD5 71f1d24c7659171eafef4774e5623113
SHA1 8712556b19ed9f80b9d4b6687decfeb671ad3bfe
SHA256 c45034620a5bb4a16e7dd0aff235cc695a5516a4194f4fec608b89eabd63eeef
SHA512 0a14c03365adb96a0ad539f8e8d8333c042668046cea63c0d11c75be0a228646ea5b3fbd6719c29580b8baaeb7a28dc027af3de10082c07e089cdda43d5c467a

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-datetime-l1-1-0.dll

MD5 c5e3e5df803c9a6d906f3859355298e1
SHA1 0ecd85619ee5ce0a47ff840652a7c7ef33e73cf4
SHA256 956773a969a6213f4685c21702b9ed5bd984e063cf8188acbb6d55b1d6ccbd4e
SHA512 deedef8eaac9089f0004b6814862371b276fbcc8df45ba7f87324b2354710050d22382c601ef8b4e2c5a26c8318203e589aa4caf05eb2e80e9e8c87fd863dfc9

C:\Users\Admin\AppData\Local\Temp\_MEI39762\api-ms-win-core-console-l1-1-0.dll

MD5 40ba4a99bf4911a3bca41f5e3412291f
SHA1 c9a0e81eb698a419169d462bcd04d96eaa21d278
SHA256 af0e561bb3b2a13aa5ca9dfc9bc53c852bad85075261af6ef6825e19e71483a6
SHA512 f11b98ff588c2e8a88fdd61d267aa46dc5240d8e6e2bfeea174231eda3affc90b991ff9aae80f7cea412afc54092de5857159569496d47026f8833757c455c23

memory/684-1373-0x00007FFDA29E0000-0x00007FFDA29ED000-memory.dmp

memory/684-1372-0x00007FFD9CCF0000-0x00007FFD9CD09000-memory.dmp

memory/684-1375-0x00007FFD98BF0000-0x00007FFD98CA8000-memory.dmp

memory/684-1374-0x00007FFD9CCC0000-0x00007FFD9CCEE000-memory.dmp

memory/684-1376-0x00007FFD9E9E0000-0x00007FFD9E9ED000-memory.dmp

memory/684-1380-0x00007FFD98750000-0x00007FFD9886C000-memory.dmp

memory/684-1379-0x00007FFD9CC90000-0x00007FFD9CCB6000-memory.dmp

memory/684-1382-0x00007FFD9CB30000-0x00007FFD9CB68000-memory.dmp

memory/684-1391-0x00007FFD998B0000-0x00007FFD998BC000-memory.dmp

memory/684-1390-0x00007FFD9CAF0000-0x00007FFD9CAFB000-memory.dmp

memory/684-1389-0x00007FFD9CB00000-0x00007FFD9CB0C000-memory.dmp

memory/684-1402-0x00007FFD99760000-0x00007FFD9976C000-memory.dmp

memory/684-1404-0x00007FFD98BB0000-0x00007FFD98BC5000-memory.dmp

memory/684-1408-0x00007FFD98BF0000-0x00007FFD98CA8000-memory.dmp

memory/684-1409-0x00007FFD98B40000-0x00007FFD98B62000-memory.dmp

memory/684-1407-0x00007FFD9CCC0000-0x00007FFD9CCEE000-memory.dmp

memory/684-1413-0x00007FFD9CB30000-0x00007FFD9CB68000-memory.dmp

memory/684-1412-0x00007FFD98A90000-0x00007FFD98ADD000-memory.dmp

memory/684-1411-0x00007FFD98AE0000-0x00007FFD98AF9000-memory.dmp

memory/684-1410-0x00007FFD98B20000-0x00007FFD98B37000-memory.dmp

memory/684-1414-0x00007FFD98A70000-0x00007FFD98A81000-memory.dmp

memory/684-1415-0x00007FFD98A50000-0x00007FFD98A6E000-memory.dmp

memory/684-1406-0x00007FFD98B70000-0x00007FFD98B84000-memory.dmp

memory/684-1416-0x00007FFD95C30000-0x00007FFD95C8D000-memory.dmp

memory/684-1405-0x00007FFD98B90000-0x00007FFD98BA2000-memory.dmp

memory/684-1403-0x00007FFD9CCF0000-0x00007FFD9CD09000-memory.dmp

memory/684-1401-0x00007FFD99780000-0x00007FFD9978C000-memory.dmp

memory/684-1400-0x00007FFD98BD0000-0x00007FFD98BE2000-memory.dmp

memory/684-1399-0x00007FFD99770000-0x00007FFD9977D000-memory.dmp

memory/684-1421-0x00007FFD95A20000-0x00007FFD95B97000-memory.dmp

memory/684-1420-0x00007FFD95BA0000-0x00007FFD95BC3000-memory.dmp

memory/684-1419-0x00007FFD95BD0000-0x00007FFD95BFE000-memory.dmp

memory/684-1418-0x00007FFD98BB0000-0x00007FFD98BC5000-memory.dmp

memory/684-1417-0x00007FFD95C00000-0x00007FFD95C29000-memory.dmp

memory/684-1422-0x00007FFD98B40000-0x00007FFD98B62000-memory.dmp

memory/684-1398-0x00007FFD99850000-0x00007FFD9985C000-memory.dmp

memory/684-1426-0x00007FFD98730000-0x00007FFD9873B000-memory.dmp

memory/684-1425-0x00007FFD98740000-0x00007FFD9874B000-memory.dmp

memory/684-1440-0x00007FFD95940000-0x00007FFD9594B000-memory.dmp

memory/684-1439-0x00007FFD95950000-0x00007FFD9595B000-memory.dmp

memory/684-1442-0x00007FFD95920000-0x00007FFD9592C000-memory.dmp

memory/684-1444-0x00007FFD95BD0000-0x00007FFD95BFE000-memory.dmp

memory/684-1443-0x00007FFD95910000-0x00007FFD9591D000-memory.dmp

memory/684-1447-0x00007FFD958E0000-0x00007FFD958EC000-memory.dmp

memory/684-1446-0x00007FFD958F0000-0x00007FFD95902000-memory.dmp

memory/684-1445-0x00007FFD95BA0000-0x00007FFD95BC3000-memory.dmp

memory/684-1450-0x00007FFD957E0000-0x00007FFD9589C000-memory.dmp

memory/684-1451-0x00007FFD957B0000-0x00007FFD957DB000-memory.dmp

memory/684-1449-0x00007FFD958A0000-0x00007FFD958D5000-memory.dmp

memory/684-1448-0x00007FFD95A20000-0x00007FFD95B97000-memory.dmp

memory/684-1441-0x00007FFD95930000-0x00007FFD9593C000-memory.dmp

memory/684-1438-0x00007FFD95960000-0x00007FFD9596C000-memory.dmp

memory/684-1437-0x00007FFD95970000-0x00007FFD9597E000-memory.dmp

memory/684-1436-0x00007FFD95980000-0x00007FFD9598C000-memory.dmp

memory/684-1435-0x00007FFD95990000-0x00007FFD9599C000-memory.dmp

memory/684-1434-0x00007FFD959A0000-0x00007FFD959AB000-memory.dmp

memory/684-1433-0x00007FFD95C30000-0x00007FFD95C8D000-memory.dmp

memory/684-1432-0x00007FFD95C00000-0x00007FFD95C29000-memory.dmp

memory/684-1431-0x00007FFD98A50000-0x00007FFD98A6E000-memory.dmp

memory/684-1452-0x00007FFD954D0000-0x00007FFD957AF000-memory.dmp

memory/684-1429-0x00007FFD959C0000-0x00007FFD959CB000-memory.dmp

memory/684-1430-0x00007FFD959B0000-0x00007FFD959BC000-memory.dmp

memory/684-1428-0x00007FFD97CA0000-0x00007FFD97CAC000-memory.dmp

memory/684-1427-0x00007FFD98A90000-0x00007FFD98ADD000-memory.dmp

memory/684-1453-0x00007FFD85DC0000-0x00007FFD87EB3000-memory.dmp

memory/684-1424-0x00007FFD98B20000-0x00007FFD98B37000-memory.dmp

memory/684-1423-0x00007FFD98940000-0x00007FFD98958000-memory.dmp

memory/684-1397-0x00007FFD99860000-0x00007FFD9986B000-memory.dmp

memory/684-1396-0x00007FFD99870000-0x00007FFD9987B000-memory.dmp

memory/684-1395-0x00007FFD99880000-0x00007FFD9988C000-memory.dmp

memory/684-1394-0x00007FFD99890000-0x00007FFD9989E000-memory.dmp

memory/684-1393-0x00007FFD998A0000-0x00007FFD998AC000-memory.dmp

memory/684-1392-0x00007FFD98CB0000-0x00007FFD99028000-memory.dmp

memory/684-1388-0x00007FFD9CB10000-0x00007FFD9CB1B000-memory.dmp

memory/684-1387-0x00007FFDA16F0000-0x00007FFDA1704000-memory.dmp

memory/684-1386-0x00007FFD9CB20000-0x00007FFD9CB2C000-memory.dmp

memory/684-1385-0x00007FFD9CC80000-0x00007FFD9CC8B000-memory.dmp

memory/684-1384-0x00007FFD9D2F0000-0x00007FFD9D2FB000-memory.dmp

memory/684-1383-0x00007FFDA1EC0000-0x00007FFDA1ED9000-memory.dmp

memory/684-1381-0x00007FFDA1710000-0x00007FFDA1733000-memory.dmp

memory/684-1378-0x00007FFD9D460000-0x00007FFD9D46B000-memory.dmp

memory/684-1377-0x00007FFD99030000-0x00007FFD99619000-memory.dmp

memory/684-1455-0x00007FFD95480000-0x00007FFD954A1000-memory.dmp

memory/684-1454-0x00007FFD954B0000-0x00007FFD954C7000-memory.dmp

memory/684-1456-0x00007FFD95450000-0x00007FFD95472000-memory.dmp

memory/684-1457-0x00007FFD953B0000-0x00007FFD9544C000-memory.dmp

memory/684-1459-0x00007FFD95340000-0x00007FFD95373000-memory.dmp

memory/684-1460-0x00007FFD952F0000-0x00007FFD95337000-memory.dmp

memory/684-1458-0x00007FFD95380000-0x00007FFD953B0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_44nce0nl.5kf.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/684-1496-0x00007FFDA16F0000-0x00007FFDA1704000-memory.dmp

memory/684-1513-0x00007FFD98A90000-0x00007FFD98ADD000-memory.dmp

memory/684-1514-0x00007FFD98A70000-0x00007FFD98A81000-memory.dmp

memory/684-1512-0x00007FFD98AE0000-0x00007FFD98AF9000-memory.dmp

memory/684-1511-0x00007FFD98B20000-0x00007FFD98B37000-memory.dmp

memory/684-1510-0x00007FFD98B40000-0x00007FFD98B62000-memory.dmp

memory/684-1509-0x00007FFD98B70000-0x00007FFD98B84000-memory.dmp

memory/684-1508-0x00007FFD98B90000-0x00007FFD98BA2000-memory.dmp

memory/684-1507-0x00007FFD98BB0000-0x00007FFD98BC5000-memory.dmp

memory/684-1506-0x00007FFD9CB30000-0x00007FFD9CB68000-memory.dmp

memory/684-1505-0x00007FFD98750000-0x00007FFD9886C000-memory.dmp

memory/684-1504-0x00007FFD9CC90000-0x00007FFD9CCB6000-memory.dmp

memory/684-1503-0x00007FFD9D460000-0x00007FFD9D46B000-memory.dmp

memory/684-1502-0x00007FFD9E9E0000-0x00007FFD9E9ED000-memory.dmp

memory/684-1501-0x00007FFD98BF0000-0x00007FFD98CA8000-memory.dmp

memory/684-1495-0x00007FFD9CD10000-0x00007FFD9CD3D000-memory.dmp

memory/684-1494-0x00007FFDA1EC0000-0x00007FFDA1ED9000-memory.dmp

memory/684-1493-0x00007FFDA29F0000-0x00007FFDA29FF000-memory.dmp

memory/684-1492-0x00007FFDA1710000-0x00007FFDA1733000-memory.dmp

memory/684-1491-0x00007FFD99030000-0x00007FFD99619000-memory.dmp

memory/684-1500-0x00007FFD9CCC0000-0x00007FFD9CCEE000-memory.dmp

memory/684-1497-0x00007FFD98CB0000-0x00007FFD99028000-memory.dmp

memory/684-1499-0x00007FFDA29E0000-0x00007FFDA29ED000-memory.dmp

memory/684-1498-0x00007FFD9CCF0000-0x00007FFD9CD09000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI7162\cryptography-43.0.0.dist-info\INSTALLER

MD5 365c9bfeb7d89244f2ce01c1de44cb85
SHA1 d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256 ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512 d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

memory/5548-3971-0x00007FFD87F90000-0x00007FFD87FB2000-memory.dmp

memory/5548-3974-0x00007FFD87D10000-0x00007FFD87D5D000-memory.dmp

memory/5548-3973-0x00007FFD87D60000-0x00007FFD87D79000-memory.dmp

memory/5548-3972-0x00007FFD87D80000-0x00007FFD87D97000-memory.dmp

memory/5548-3970-0x00007FFD87FC0000-0x00007FFD87FD4000-memory.dmp

memory/5548-3969-0x00007FFD87FE0000-0x00007FFD87FF2000-memory.dmp

memory/5548-3968-0x00007FFD88000000-0x00007FFD88015000-memory.dmp

memory/5548-3967-0x00007FFD8DA20000-0x00007FFD8DA2C000-memory.dmp

memory/5548-3966-0x00007FFD8DA30000-0x00007FFD8DA42000-memory.dmp

memory/5548-3965-0x00007FFD8DA50000-0x00007FFD8DA5D000-memory.dmp

memory/5548-3964-0x00007FFD8DA60000-0x00007FFD8DA6C000-memory.dmp

memory/5548-3963-0x00007FFD8DA70000-0x00007FFD8DA7C000-memory.dmp

memory/5548-3962-0x00007FFD8DD90000-0x00007FFD8DD9B000-memory.dmp

memory/5548-3961-0x00007FFD8DDA0000-0x00007FFD8DDAB000-memory.dmp

memory/5548-3960-0x00007FFD8DDB0000-0x00007FFD8DDBC000-memory.dmp

memory/5548-3959-0x00007FFD8DDC0000-0x00007FFD8DDCE000-memory.dmp

memory/5548-3958-0x00007FFD91F20000-0x00007FFD91F2C000-memory.dmp

memory/5548-3957-0x00007FFD93AE0000-0x00007FFD93AEC000-memory.dmp

memory/5548-3956-0x00007FFD97CA0000-0x00007FFD97CAB000-memory.dmp

memory/5548-3955-0x00007FFD98730000-0x00007FFD9873C000-memory.dmp

memory/5548-3954-0x00007FFD98740000-0x00007FFD9874B000-memory.dmp

memory/5548-3953-0x00007FFD99730000-0x00007FFD9973C000-memory.dmp

memory/5548-3952-0x00007FFD99760000-0x00007FFD9976B000-memory.dmp

memory/5548-3951-0x00007FFD9CAF0000-0x00007FFD9CAFB000-memory.dmp

memory/5548-3950-0x00007FFD93AF0000-0x00007FFD93B28000-memory.dmp

memory/5548-3949-0x00007FFD87DA0000-0x00007FFD87EBC000-memory.dmp

memory/5548-3948-0x00007FFD94F80000-0x00007FFD94FA6000-memory.dmp

memory/5548-3947-0x00007FFD9D2F0000-0x00007FFD9D2FB000-memory.dmp

memory/5548-3946-0x00007FFD9D460000-0x00007FFD9D46D000-memory.dmp

memory/5548-3945-0x00007FFD8DA80000-0x00007FFD8DB38000-memory.dmp

memory/5548-3944-0x00007FFD98750000-0x00007FFD9877E000-memory.dmp

memory/5548-3943-0x00007FFD9E9E0000-0x00007FFD9E9ED000-memory.dmp

memory/5548-3942-0x00007FFD98780000-0x00007FFD98799000-memory.dmp

memory/5548-3941-0x00007FFD94FB0000-0x00007FFD95328000-memory.dmp

memory/5548-3940-0x00007FFD98940000-0x00007FFD98954000-memory.dmp

memory/5548-3939-0x00007FFD98A40000-0x00007FFD98A6D000-memory.dmp

memory/5548-3938-0x00007FFD98A70000-0x00007FFD98A89000-memory.dmp

memory/5548-3937-0x00007FFDA16F0000-0x00007FFDA16FF000-memory.dmp

memory/5548-3935-0x00007FFD93B30000-0x00007FFD94119000-memory.dmp

memory/5548-3936-0x00007FFD98A90000-0x00007FFD98AB3000-memory.dmp