Malware Analysis Report

2024-11-15 07:42

Sample ID 240803-ffbm7aycne
Target source_prepared.exe
SHA256 9c09cefd985f22f9691a4acada5354281fb825acacdef30394287b652d1ba29b
Tags
pyinstaller pysilon discovery upx evasion execution persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

9c09cefd985f22f9691a4acada5354281fb825acacdef30394287b652d1ba29b

Threat Level: Known bad

The file source_prepared.exe was found to be: Known bad.

Malicious Activity Summary

pyinstaller pysilon discovery upx evasion execution persistence

Detect Pysilon

Pysilon family

Enumerates VirtualBox DLL files

Command and Scripting Interpreter: PowerShell

Sets file to hidden

Loads dropped DLL

UPX packed file

Executes dropped EXE

Adds Run key to start application

Legitimate hosting services abused for malware hosting/C2

Unsigned PE

Browser Information Discovery

Detects Pyinstaller

Kills process with taskkill

Suspicious behavior: EnumeratesProcesses

Suspicious use of FindShellTrayWindow

Suspicious use of SendNotifyMessage

Suspicious use of WriteProcessMemory

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of AdjustPrivilegeToken

Enumerates system info in registry

Suspicious use of SetWindowsHookEx

Views/modifies file attributes

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-03 04:48

Signatures

Detect Pysilon

Description Indicator Process Target
N/A N/A N/A N/A

Pysilon family

pysilon

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-03 04:48

Reported

2024-08-03 04:51

Platform

win7-20240708-en

Max time kernel

61s

Max time network

153s

Command Line

"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A

Browser Information Discovery

discovery

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
Token: SeShutdownPrivilege N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of FindShellTrayWindow

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of SendNotifyMessage

Description Indicator Process Target
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A
N/A N/A C:\Program Files\Google\Chrome\Application\chrome.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 764 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Users\Admin\AppData\Local\Temp\source_prepared.exe
PID 764 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Users\Admin\AppData\Local\Temp\source_prepared.exe
PID 764 wrote to memory of 2372 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Users\Admin\AppData\Local\Temp\source_prepared.exe
PID 1280 wrote to memory of 2608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2608 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 2168 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 1952 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 1952 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 1952 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 1536 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 1536 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 1536 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 1536 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 1536 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 1536 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 1536 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 1536 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 1536 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 1536 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 1536 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 1536 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 1536 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 1536 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 1536 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe
PID 1280 wrote to memory of 1536 N/A C:\Program Files\Google\Chrome\Application\chrome.exe C:\Program Files\Google\Chrome\Application\chrome.exe

Processes

C:\Users\Admin\AppData\Local\Temp\source_prepared.exe

"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"

C:\Users\Admin\AppData\Local\Temp\source_prepared.exe

"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"

C:\Windows\explorer.exe

"C:\Windows\explorer.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6239758,0x7fef6239768,0x7fef6239778

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1184 --field-trial-handle=1384,i,9935834593730165535,9157612006375970506,131072 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1384,i,9935834593730165535,9157612006375970506,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1576 --field-trial-handle=1384,i,9935834593730165535,9157612006375970506,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1932 --field-trial-handle=1384,i,9935834593730165535,9157612006375970506,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=1412 --field-trial-handle=1384,i,9935834593730165535,9157612006375970506,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe

"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1584 --field-trial-handle=1384,i,9935834593730165535,9157612006375970506,131072 /prefetch:2

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1404 --field-trial-handle=1384,i,9935834593730165535,9157612006375970506,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --mojo-platform-channel-handle=3928 --field-trial-handle=1384,i,9935834593730165535,9157612006375970506,131072 /prefetch:1

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2192 --field-trial-handle=1384,i,9935834593730165535,9157612006375970506,131072 /prefetch:8

C:\Program Files\Google\Chrome\Application\chrome.exe

"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4196 --field-trial-handle=1384,i,9935834593730165535,9157612006375970506,131072 /prefetch:8

Network

Country Destination Domain Proto
US 8.8.8.8:53 www.google.com udp
NL 142.250.27.103:443 www.google.com udp
NL 142.250.27.103:443 www.google.com tcp
US 8.8.8.8:53 discord.com udp
US 162.159.138.232:443 discord.com tcp
US 162.159.138.232:443 discord.com tcp
US 162.159.138.232:443 discord.com udp
US 8.8.8.8:53 cdn.prod.website-files.com udp
US 8.8.8.8:53 ajax.googleapis.com udp
US 8.8.8.8:53 cdn.localizeapi.com udp
US 104.18.29.203:443 cdn.prod.website-files.com tcp
US 172.67.41.53:443 cdn.localizeapi.com tcp
US 8.8.8.8:53 apps.identrust.com udp
GB 23.200.147.41:80 apps.identrust.com tcp
US 8.8.8.8:53 d3e54v103j8qbb.cloudfront.net udp
GB 18.165.229.80:443 d3e54v103j8qbb.cloudfront.net tcp
US 104.18.29.203:443 cdn.prod.website-files.com udp
US 8.8.8.8:53 cdn.discordapp.com udp
US 162.159.129.233:443 cdn.discordapp.com tcp
US 8.8.8.8:53 assets.website-files.com udp
US 162.159.129.233:443 cdn.discordapp.com tcp
US 162.159.129.233:443 cdn.discordapp.com tcp
US 162.159.129.233:443 cdn.discordapp.com tcp
US 162.159.129.233:443 cdn.discordapp.com tcp
US 162.159.129.233:443 cdn.discordapp.com tcp
GB 52.84.90.32:443 assets.website-files.com tcp
GB 52.84.90.32:443 assets.website-files.com tcp
GB 52.84.90.32:443 assets.website-files.com tcp
GB 52.84.90.32:443 assets.website-files.com tcp
GB 52.84.90.32:443 assets.website-files.com tcp
US 104.18.29.203:443 cdn.prod.website-files.com udp
US 8.8.8.8:53 geolocation.onetrust.com udp
US 104.18.28.127:443 geolocation.onetrust.com tcp
US 8.8.8.8:53 www.youtube.com udp
NL 142.250.27.190:443 www.youtube.com tcp
US 8.8.8.8:53 a.nel.cloudflare.com udp
US 35.190.80.1:443 a.nel.cloudflare.com tcp
NL 142.250.27.190:443 www.youtube.com udp
US 35.190.80.1:443 a.nel.cloudflare.com udp
US 8.8.8.8:53 beacons.gcp.gvt2.com udp
US 142.250.69.3:443 beacons.gcp.gvt2.com tcp
N/A 224.0.0.251:5353 udp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI7642\wheel-0.43.0.dist-info\INSTALLER

MD5 365c9bfeb7d89244f2ce01c1de44cb85
SHA1 d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256 ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512 d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

C:\Users\Admin\AppData\Local\Temp\_MEI7642\ucrtbase.dll

MD5 a6b4fba258d519da313f7be057435ee4
SHA1 0bf414057d0749e9db4da7683eb6d11be174cdd5
SHA256 aa092722797b9a74e9463516e6c63d4d3c904ac263f4a4ea421b0d4d4875f606
SHA512 34f3d006a9bb7835e9d82465874e059a328c8d69abd61c79d6a85a7702df582dabc93126918a0514356fda2810c77acc1d6070ad4418921bd9e8efe34697e4a1

C:\Users\Admin\AppData\Local\Temp\_MEI7642\python312.dll

MD5 506c760a20e6bb940590229d41449ffa
SHA1 b7c439f253987fb0ff66fc5ce959cf711b18eb8d
SHA256 e63503b2715df3eab8abb9b2682129e27a7add9acea9008f06f55494a2b2f3d5
SHA512 34df2e8e53caac0cd72cb3c5848296ca8cfa10c542c0a5f88385d6b35ab70b86957540de2ff105a27cefb37ccbb5789261a69132b535a857df32875c1f9deb9e

\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-file-l2-1-0.dll

MD5 e1d37d21f7875483ae0d187032d5714c
SHA1 51a945a9e6ccf994781a028cd07ab8ee820f542c
SHA256 1076a19f2a42a35c8639fb1ce1666d046e0fd259142f7e645e350211d9d6390f
SHA512 77973d6e5e6ad68b304f50184a95be9d4993338f4f69e07c11275951b2fcfdc02c061182d1a7a394dc18fe77d6d021dd9e8e17cdfbbb8d0c77752c6df1979011

\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-timezone-l1-1-0.dll

MD5 dd86613bbc3da5e41d8bd30803d87c1f
SHA1 35690b9b0fe48f045568e25221694be041f56d4f
SHA256 2312923d7e07c1f58f457ac434b89c01ce675ff42d74bb279326d6c573f675ed
SHA512 6d4a29c99e819368389a9347a719e78125dfbc3166af85425db81f38833b57ba28251472dd42db974876bcf8bc73465d638678b06e3482ceb36c19b943f41ca4

\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-processthreads-l1-1-1.dll

MD5 0f99a725b93375f0ba8795e67e5a4fdf
SHA1 9825f0ec9cc4ba99471f4587d4bf97f7083d5f93
SHA256 be77a15dcaf73a7c1be6c62f57e79ef7bbc305e1b7753a4345ba1d88851dba08
SHA512 f95b6472b78f2bea732c6cc4933c83da7cbbf3eec67544b9faf86c6d6183c23e47afadb23e78420ed2dcec7ddde819e0fcb14345614c5acb3d959fca7c5a7468

\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-localization-l1-2-0.dll

MD5 09fed91680050e3149c29cf068bc10e5
SHA1 e9933b81c1d7b717f230ea98bb6bafbc1761ec4a
SHA256 3c5900c9e7fbada56e86d8973a582771dde6bff79ca80ae05920a33a2cc435df
SHA512 e514590385561731f2ad18afd6bcefac012ea8061a40b6ccfda4e45ff5768617b2e1b06e849e8a640a10ca59039e89ba88cac5d3b7ff088968eb4bc78e212d3a

\Users\Admin\AppData\Local\Temp\_MEI7642\api-ms-win-core-file-l1-2-0.dll

MD5 b38d5b15f77e6cd93763c76ff1bc79ee
SHA1 cadffe8a06835a7c1aa136a5515302d80d8e7419
SHA256 aa9e41933f1cf1c3bcc3b65771297b0ef088fac153c7997c0d48e7882714d05f
SHA512 46eaeb419654efd999146b9cd55ece42939e071f089ccb4698a09f4bb6b881106a3e342901439f867f609c1147ef151832b2919d2a33726643a6e5c4086a5f3a

memory/2372-1328-0x000007FEF6130000-0x000007FEF67F4000-memory.dmp

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\000007.dbtmp

MD5 18e723571b00fb1694a3bad6c78e4054
SHA1 afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA256 8af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA512 43bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2

\??\pipe\crashpad_1280_NNGTNMWUZLIRBWKC

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\GPUCache\data_1

MD5 f50f89a0a91564d0b8a211f8921aa7de
SHA1 112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256 b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512 bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\a16d6876-e5a7-49eb-9d1e-8e11cb64db12.tmp

MD5 d0660395066519056aa133f3909dba1a
SHA1 8273dc1d4fabed8c58e81d869c268f8fe2910603
SHA256 d7908625c62c6a496da1ad4c0babceec88fdf9dd75639ef25be22189ff833cfb
SHA512 898dd29164e62bd18f9c99d876fa709f4ddb2f504db44cb373896732bd219c46021afacfc959e588910789d0679493d5648a8939ca18d85d67505032b778ff4b

C:\Users\Admin\AppData\Local\Temp\CabDEEC.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\TarDF1E.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e50da3313bcae0cd9e62a52a46080869
SHA1 f21fd10c9a045894fada375340f37267c72975bc
SHA256 322754219773580b222a1ffdb57fc03e2cadd12ae6102cafe9b52c72a2a03705
SHA512 46c7d07da813a56f9b184959cef5bf3bc6923a203968db0034b124f565f28f148e94b5f509126ffad0fbd8f537e74b71534f0a21b74a30b592d5bf418efdc8bb

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 51fece6a0157fd269946d6dabf5bb985
SHA1 4ea24c83bf88006529af6d46d25858c808371726
SHA256 2aa54c00d9687e858615ed04423142dabecee2b20e0fafd3a4e3b421912d97b2
SHA512 39d196c3c7f6501f529fa29ee34a56c3f423c701dee80a8f01bfc1f69ea91cde52a90c2c2ba4405906f9502d59e543665f64c8d45c4f3c6f2bb5544aa8d4d824

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 55fe1a59544e7de205b57b2ca6d499be
SHA1 b8c9b580214a22269ffb142590706a65552cfb4c
SHA256 ac33a173d8bc1caa1a082841c9356676adc6577d5cc97bb22550566e6ed037f3
SHA512 77625c714b346d8dfb75a23edee4cdebf2443a8ec46871bb3064dd22c42e119d3ec4a9e46658623038991a5897f0c432029dfb724e5b33d303a20f458b0ab0ad

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 f5c96e5ddf9a53e8590eeae450e1abc2
SHA1 3c00faa52e19dd00c875adb14b2addc0429d5967
SHA256 f6182f2ecd06666cce7d7fc7fe3193d3c81f3465e6dac8a048a01d38e8bf92f3
SHA512 9d8a3b5c0ca86ec0109a4e9ccaf1c7553e68accb727f04d903ec1eda51c58f0ef0f852626eafecd4a10b26096a5768c6ed53234ece1f7fdbe56ade21efd5f914

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 ca6c63113d32936a7c281b64cc6c9b97
SHA1 7cf5017a7600079d812eadbfcc155fb03cd40fa6
SHA256 e153e00fb6d4373ff5414cbc606c0e4281e7bb2950c4545a56923015bfede045
SHA512 b3c5b1381987c4c2c55b36cbf345a2c39a3d92440a807af45e81f2deccf0fd0682bbc2407d5e7fa5cfb96f4e1ab85d304b64fa6f64f66b9e728203e2f466567e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416

MD5 cf2ee07aa286cec3d672268b6a8483b1
SHA1 44212444bd5852122ce73f8e5f90383bf6181881
SHA256 625ae143f4566393ba3c53ddfee3d9775686f4067021b8e1ee54e08efa18c12b
SHA512 11d964239216394879b34a4fac45f8c52e62d71575857a5a71d9efb374089e72bdb250612ce43621648db429487e92bc06ead1edb142b8353d2baacff8bd751e

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\070E0202839D9D67350CD2613E78E416

MD5 55540a230bdab55187a841cfe1aa1545
SHA1 363e4734f757bdeb89868efe94907774a327695e
SHA256 d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512 c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 e2f44b1dad2fb627ca3d77c4470f0ad2
SHA1 3f3d096ca891aaab8f23f0da97da1f763caddb61
SHA256 5349273cfcce4e7bac7e50fb86c35224a7b4aa0e71403caa4562731ff34ad472
SHA512 6c76e6c2fda3533717a0fa3ed13b6d40cc691e86f69b56632063d42fec0dfe4a40db7af9213878ecab577211758e49188fe54a39e0dabcce6e5a777b524e0323

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

MD5 9653ef24e01a38545deb78742b4c9a61
SHA1 e37f0bc11ce03f5823e445a09c7a8e304913b375
SHA256 9db4e00235ad1e06cdd0bbc135e155a25605a5aa8f215184ee28a9afbae14434
SHA512 a4d341087eb4bebed867e79531e9c462d7eb294add1f8a35b2baa38ae8553fffe29eb70acffd28a49d66d4a3c6a87d9639db5a7f5a611cb372b066650d179691

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

MD5 77c5b378902d4a5169d58d1021e0903b
SHA1 16ac2f2333fc0cb13872106d72446852bbe43bdf
SHA256 51545def0971a0ee0c4fe78ee842c20b11c6538785b4a4bc3beff7354f9f96c7
SHA512 20230a21cd54b8eba993eea31d30ab345a110cfa4e66185e173af6f11cf6854aefbbd8eddf39841f3dbad500a1170ff0e211f6c65e35dc24a9854ba32690e276

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 c54e0855cef2b76f8a9d40eed01886f7
SHA1 7a6f1e8e3e4e32222b4d336c20ddbb61723bad41
SHA256 754a703e7136f33515791f05196b03991d624b7521ed9358dc1a0f46503ca5c1
SHA512 2b97141e1769f91f26d6ed2964c9a69d117183fc3f7d5000b827dc1a27ea704eb45bbbb4d1e4a2d5319493edd62505082f6bd431a9468cf43caf904198cc3e0f

C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

MD5 1c5f2b5f0c5db16a3d51a4219c20923f
SHA1 4a3a6490878240cdc6f67389fe616e7c934e67e2
SHA256 d0b91e7f91f94ccc6446d81f1f18b01c11343f995f616bfa41bc03a23ca8257f
SHA512 cb397b5617cc100c70fd09e1816df1a37830c4713da3cac965c1ac8e9fa1aa64372eb6198ec51e6f6a0d273dddd789d02ecc851edbe7f3fd686bf30f6cf44d24

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-03 04:48

Reported

2024-08-03 04:51

Platform

win10v2004-20240802-en

Max time kernel

145s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"

Signatures

Enumerates VirtualBox DLL files

Description Indicator Process Target
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\image proof\proof.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\image proof\proof.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\image proof\proof.exe N/A
N/A N/A C:\Users\Admin\image proof\proof.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\image = "C:\\Users\\Admin\\image proof\\proof.exe" C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\image proof\proof.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\image proof\proof.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\image proof\proof.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 728 wrote to memory of 2288 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Users\Admin\AppData\Local\Temp\source_prepared.exe
PID 728 wrote to memory of 2288 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Users\Admin\AppData\Local\Temp\source_prepared.exe
PID 2288 wrote to memory of 3236 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2288 wrote to memory of 3236 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2288 wrote to memory of 352 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Windows\system32\cmd.exe
PID 2288 wrote to memory of 352 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Windows\system32\cmd.exe
PID 352 wrote to memory of 4556 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 352 wrote to memory of 4556 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 352 wrote to memory of 3060 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\image proof\proof.exe
PID 352 wrote to memory of 3060 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\image proof\proof.exe
PID 352 wrote to memory of 2248 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 352 wrote to memory of 2248 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 3060 wrote to memory of 1160 N/A C:\Users\Admin\image proof\proof.exe C:\Users\Admin\image proof\proof.exe
PID 3060 wrote to memory of 1160 N/A C:\Users\Admin\image proof\proof.exe C:\Users\Admin\image proof\proof.exe
PID 1160 wrote to memory of 4576 N/A C:\Users\Admin\image proof\proof.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1160 wrote to memory of 4576 N/A C:\Users\Admin\image proof\proof.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\source_prepared.exe

"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"

C:\Users\Admin\AppData\Local\Temp\source_prepared.exe

"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x3c0 0x2d0

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\image proof\""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\image proof\activate.bat""

C:\Windows\system32\attrib.exe

attrib +s +h .

C:\Users\Admin\image proof\proof.exe

"proof.exe"

C:\Windows\system32\taskkill.exe

taskkill /f /im "source_prepared.exe"

C:\Users\Admin\image proof\proof.exe

"proof.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\image proof\""

C:\Windows\System32\rundll32.exe

C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding

Network

Country Destination Domain Proto
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
N/A 127.0.0.1:56910 tcp
US 8.8.8.8:53 discord.com udp
US 162.159.135.232:443 discord.com tcp
US 162.159.137.232:443 discord.com tcp
US 162.159.138.232:443 discord.com tcp
US 8.8.8.8:53 232.135.159.162.in-addr.arpa udp
US 8.8.8.8:53 232.137.159.162.in-addr.arpa udp
US 162.159.136.232:443 discord.com tcp
US 8.8.8.8:53 232.138.159.162.in-addr.arpa udp
US 162.159.128.233:443 discord.com tcp
US 8.8.8.8:53 232.136.159.162.in-addr.arpa udp
US 8.8.8.8:53 233.128.159.162.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 52.111.229.48:443 tcp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI7282\wheel-0.43.0.dist-info\INSTALLER

MD5 365c9bfeb7d89244f2ce01c1de44cb85
SHA1 d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256 ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512 d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

C:\Users\Admin\AppData\Local\Temp\_MEI7282\ucrtbase.dll

MD5 a6b4fba258d519da313f7be057435ee4
SHA1 0bf414057d0749e9db4da7683eb6d11be174cdd5
SHA256 aa092722797b9a74e9463516e6c63d4d3c904ac263f4a4ea421b0d4d4875f606
SHA512 34f3d006a9bb7835e9d82465874e059a328c8d69abd61c79d6a85a7702df582dabc93126918a0514356fda2810c77acc1d6070ad4418921bd9e8efe34697e4a1

C:\Users\Admin\AppData\Local\Temp\_MEI7282\python312.dll

MD5 506c760a20e6bb940590229d41449ffa
SHA1 b7c439f253987fb0ff66fc5ce959cf711b18eb8d
SHA256 e63503b2715df3eab8abb9b2682129e27a7add9acea9008f06f55494a2b2f3d5
SHA512 34df2e8e53caac0cd72cb3c5848296ca8cfa10c542c0a5f88385d6b35ab70b86957540de2ff105a27cefb37ccbb5789261a69132b535a857df32875c1f9deb9e

C:\Users\Admin\AppData\Local\Temp\_MEI7282\VCRUNTIME140.dll

MD5 be8dbe2dc77ebe7f88f910c61aec691a
SHA1 a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA256 4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA512 0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

memory/2288-1320-0x00007FFE8F780000-0x00007FFE8FE44000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI7282\base_library.zip

MD5 55df3c98d18ec80bc37a6682ba0abcbb
SHA1 e3bf60cfecfee2473d4e0b07057af3c27afa6567
SHA256 d8de678c0ac0cecb7be261bda75511c47e6a565f0c6260eacf240c7c5039753b
SHA512 26368c9187155ee83c450bfc792938a2908c473ba60330ce95bcc3f780390043879bbff3949bd4a25b38343eac3c5c9ba709267959109c9c99a229809c97f3bd

C:\Users\Admin\AppData\Local\Temp\_MEI7282\_ctypes.pyd

MD5 9b718ce91a49157047c8ad57ab67b7b7
SHA1 55befa0ec91b724c27de29c0d2e9cf645daee5e0
SHA256 129443f9fbc7b8e80ab55403f33112353b3266f9be2aa75112af01627167761d
SHA512 f1f46ce129809618f744d31390b272639af4c885414c463fdbfffbafb8bdd26580ae81e6c0a8da52992ee10112bd09add37c67c9fc54218a2f97645d157ea232

C:\Users\Admin\AppData\Local\Temp\_MEI7282\python3.DLL

MD5 a07661c5fad97379cf6d00332999d22c
SHA1 dca65816a049b3cce5c4354c3819fef54c6299b0
SHA256 5146005c36455e7ede4b8ecc0dc6f6fa8ea6b4a99fedbabc1994ae27dfab9d1b
SHA512 6ddeb9d89ccb4d2ec5d994d85a55e5e2cc7af745056dae030ab8d72ee7830f672003f4675b6040f123fc64c19e9b48cabd0da78101774dafacf74a88fbd74b4d

C:\Users\Admin\AppData\Local\Temp\_MEI7282\libffi-8.dll

MD5 013a0b2653aa0eb6075419217a1ed6bd
SHA1 1b58ff8e160b29a43397499801cf8ab0344371e7
SHA256 e9d8eb01bb9b02ce3859ba4527938a71b4668f98897d46f29e94b27014036523
SHA512 0bd13fa1d55133ee2a96387e0756f48133987bacd99d1f58bab3be7bffdf868092060c17ab792dcfbb4680f984f40d3f7cc24abdd657b756496aa8884b8f6099

memory/2288-1330-0x00007FFEA6F40000-0x00007FFEA6F4F000-memory.dmp

memory/2288-1329-0x00007FFEA55B0000-0x00007FFEA55D5000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI7282\_bz2.pyd

MD5 74aad55dc2ffae6a7763a95db6bf80f3
SHA1 eb1b2f7f9ec42a982d186631af92bdb6be214433
SHA256 21775c01c7dc3558d13eb4f37258f6e480605b7fcde9d586c341d4ab9ebb6d08
SHA512 7a7bd790a6cab3e6d2e9b95123ba4325d11cbfcfd257e0955698aa8248e0262a5577297cdd1413c79b66fa22b5e8cf7707d68735309cc9445d600118b65b08df

memory/2288-1333-0x00007FFEA44E0000-0x00007FFEA44FA000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI7282\_lzma.pyd

MD5 52c7db037e5d3cca65dee601286ca2c7
SHA1 eaa58f4e3386f2b279c8bd719fa195274a97ec41
SHA256 6a78157f4a558c8578b14de47d76a4cd766cbee7ed65d25e715838489bd1b406
SHA512 b8ef09ac685fd7dd39ab3d693b5ffe2bf4667e6f1127e18de1cf073316eda10488e39a043f17ac1b595888fed5a27c40434b2e3c3c2467edece5e04c9a15c70e

memory/2288-1336-0x00007FFE9FBC0000-0x00007FFE9FBED000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-file-l1-2-0.dll

MD5 b38d5b15f77e6cd93763c76ff1bc79ee
SHA1 cadffe8a06835a7c1aa136a5515302d80d8e7419
SHA256 aa9e41933f1cf1c3bcc3b65771297b0ef088fac153c7997c0d48e7882714d05f
SHA512 46eaeb419654efd999146b9cd55ece42939e071f089ccb4698a09f4bb6b881106a3e342901439f867f609c1147ef151832b2919d2a33726643a6e5c4086a5f3a

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-crt-environment-l1-1-0.dll

MD5 eaf1266b1b58d3228d9c8c6c51e61970
SHA1 28742ae8c761883ae391b72e6f78d65ce9fda5af
SHA256 b1e76699a66f81013ca416fb4d52499b060a00c0d30ff108243a42af2c528ac1
SHA512 5c73dc91be717164f2d519286c8cc46148204b5554bbf7f61e017f95eb1281bd2e906cf00564d1ae2bf68257ef28c069a4434d65c45e0ba5dc649068bdd31cfb

C:\Users\Admin\AppData\Local\Temp\_MEI7282\libogg-0.dll

MD5 0d65168162287df89af79bb9be79f65b
SHA1 3e5af700b8c3e1a558105284ecd21b73b765a6dc
SHA256 2ec2322aec756b795c2e614dab467ef02c3d67d527ad117f905b3ab0968ccf24
SHA512 69af81fd2293c31f456b3c78588bb6a372fe4a449244d74bfe5bfaa3134a0709a685725fa05055cfd261c51a96df4b7ebd8b9e143f0e9312c374e54392f8a2c2

C:\Users\Admin\AppData\Local\Temp\_MEI7282\libmodplug-1.dll

MD5 2bb2e7fa60884113f23dcb4fd266c4a6
SHA1 36bbd1e8f7ee1747c7007a3c297d429500183d73
SHA256 9319bf867ed6007f3c61da139c2ab8b74a4cb68bf56265a101e79396941f6d3b
SHA512 1ddd4b9b9238c1744e0a1fe403f136a1def8df94814b405e7b01dd871b3f22a2afe819a26e08752142f127c3efe4ebae8bfd1bd63563d5eb98b4644426f576b2

C:\Users\Admin\AppData\Local\Temp\_MEI7282\libjpeg-9.dll

MD5 c22b781bb21bffbea478b76ad6ed1a28
SHA1 66cc6495ba5e531b0fe22731875250c720262db1
SHA256 1eed2385030348c84bbdb75d41d64891be910c27fab8d20fc9e85485fcb569dd
SHA512 9b42cad4a715680a27cd79f466fd2913649b80657ff042528cba2946631387ed9fb027014d215e1baf05839509ca5915d533b91aa958ae0525dea6e2a869b9e4

C:\Users\Admin\AppData\Local\Temp\_MEI7282\libcrypto-3.dll

MD5 8fed6a2bbb718bb44240a84662c79b53
SHA1 2cd169a573922b3a0e35d0f9f252b55638a16bca
SHA256 f8de79a5dd7eeb4b2a053315ab4c719cd48fe90b0533949f94b6a291e6bc70fd
SHA512 87787593e6a7d0556a4d05f07a276ffdbef551802eb2e4b07104362cb5af0b32bffd911fd9237799e10e0c8685e9e7a7345c3bce2ad966843c269b4c9bd83e03

memory/2288-1383-0x00007FFE9FBA0000-0x00007FFE9FBB4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI7282\freetype.dll

MD5 04a9825dc286549ee3fa29e2b06ca944
SHA1 5bed779bf591752bb7aa9428189ec7f3c1137461
SHA256 50249f68b4faf85e7cd8d1220b7626a86bc507af9ae400d08c8e365f9ab97cde
SHA512 0e937e4de6cbc9d40035b94c289c2798c77c44fc1dc7097201f9fab97c7ff9e56113c06c51693f09908283eda92945b36de67351f893d4e3162e67c078cff4ec

C:\Users\Admin\AppData\Local\Temp\_MEI7282\crypto_clipper.json

MD5 8bff94a9573315a9d1820d9bb710d97f
SHA1 e69a43d343794524b771d0a07fd4cb263e5464d5
SHA256 3f7446866f42bcbeb8426324d3ea58f386f3171abe94279ea7ec773a4adde7d7
SHA512 d5ece1ea9630488245c578cb22d6d9d902839e53b4550c6232b4fb9389ef6c5d5392426ea4a9e3c461979d6d6aa94ddf3b2755f48e9988864788b530cdfcf80f

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-crt-utility-l1-1-0.dll

MD5 dd274d651970197e27feab08ce4b028d
SHA1 6664642754c808c3f90a07bdac130667640292ff
SHA256 9613e7e0e7abbb4fef8cfb509992382de6b42bf77c13d332f0c63cf607657645
SHA512 2e44a4cc4c270879f1fe2f0196273ce8b5ec501a3be367fccf0d2e314aa92ca5b61b38394970a82f3af1c7507d988b23a4888a572fa26fd5d1a41f6b864b3987

memory/2288-1384-0x00007FFE8F250000-0x00007FFE8F779000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-crt-string-l1-1-0.dll

MD5 3635ebce411c68d4a19345c2770392a2
SHA1 916f6a4991b8478be93036e6301700685bc91234
SHA256 eb137321cbaed6ac69d598d0f7292a742b341597abf8b450ef540856916f7233
SHA512 fec461681a4e827adc2797e09d86a80711fecc95bca64f11519a9af822bd972ff8cd63aea50aa68a3aa23eab4ef5d0c8591f0e8926f802e0cd665607d0659b1e

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-crt-time-l1-1-0.dll

MD5 7c33d39026d00829b6471b6553d58585
SHA1 d4540ce9ed17ac5d00fc88bdbfd9db024fc2aa27
SHA256 51c921caa246c20435d4ad5b0785dcb71879aa075ce7c2edf26a13f834e49f35
SHA512 76429a39f3a8e6e47a34bfe3cc1ae2e73386a81c06b851342d09de573c039ca136a78cd5575ac7ffb12ea3454bc33075fb8679e33edd9507bf6ffcefc7aa13e0

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-crt-stdio-l1-1-0.dll

MD5 f00c8e79700909c80a951b900cfae3b7
SHA1 9d41dadb0fba7ea16af40799991225c8f548aeea
SHA256 8a3d1982788c532604dbfa17171d71f8ad85880179e0a3e08c92dcf6536e5ed1
SHA512 033696e294e251cbbf6c8af6774141a1bf51f2056385610d310676e35f1849588f8280128ad090d94015adbc448136ab58486d554ac177e48598065cf64d6c59

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-crt-runtime-l1-1-0.dll

MD5 5fc379b333e9d064513fd842ba6b01a4
SHA1 15196ba491dc9b0701b94323017a8ad9a466b6f4
SHA256 d16db9232ec6d06603e049ba8881cd15f1636c2a83c4e91a9f9abd8624b321e4
SHA512 70a2604cb3e9a4d9a167d0080b2ed7081cad6217fa8569223bca720624fea9cec68604712ac24ab301cddc6d71c01b5b1c581f67ac5e43a1826726471344302f

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-crt-process-l1-1-0.dll

MD5 86b8122f87c75cc3dbb3845b16030c64
SHA1 ae65379a9a2312fc7eb58768860b75d0e83b0cc4
SHA256 c4d65f157ffd21f673ee6096952a0576b9d151b803199c3f930b82119c148f62
SHA512 e53a00b8788a865351898f316c307fe18ad2e2dca687b32d7a7f88b816918206e68fb90e4a87eb8cdab76183c975b70398eaba3bad049712eac519bcb2eb14fd

memory/2288-1386-0x00007FFEA4750000-0x00007FFEA475D000-memory.dmp

memory/2288-1385-0x00007FFE9FB80000-0x00007FFE9FB99000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-crt-private-l1-1-0.dll

MD5 3e07d85a5ced75f3fc2ec2d48fd45563
SHA1 c2594cbbd44a3b3542cab3e94239411b0bb6c233
SHA256 42921284fcff8f84543c4da8d7883e968324364541e008b57a10ce8781a4ccec
SHA512 df20e6f1f1ae1d72741a084ff1860b5db8e2535d01e46f5f8436dd3ec20249573ae52ea5f8990e4fa3f7f6d0fcd93ccae7bfa202628bd65dec34338fdb02b601

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-crt-math-l1-1-0.dll

MD5 9c6c9fe11c6b86bf31b1828331fbc90e
SHA1 fe18fe7e593e578fadb826df7b8e66aa80848963
SHA256 3308d7121df05de062333b772d91229ae13f626c5aad4255c025cbe5694bc1d8
SHA512 3d84434ce23038b713378a6e02d5f58b5e501bf2b4c3ffdb645a1600f386795b24931ad8dc1edc7dc0b00a69fd99f30567da32cb4c396c3800e29451fda1804c

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-crt-locale-l1-1-0.dll

MD5 1ce8dc500f8d647e45c5277186022b7a
SHA1 ab146c73f9294c7193a2973f2ed3cc9fcf641630
SHA256 396473df7b8645421a1e78358f4e5eefd90c3c64d1472b3bf90765a70847d5eb
SHA512 32b049156e820d8020325123f2e11c123b70573332e494834a2d648f89bca228d94b4ca5acf91dfdfcdd8444be37877c25881c972122dafb19fc43e5c39d1d04

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-crt-heap-l1-1-0.dll

MD5 fc617cea3a386409177b559099f22557
SHA1 d5291dbcb7a2458b34c8af9d539df4276a1d99ae
SHA256 9f6f171a5c1b0b7947fec31937d8b30789ae4fede08e78f6db2227f0fc22eb73
SHA512 bc3318c0382007895194397c1680cc308916d9ad1450d9e09e8e71f48772dcc890f4189da8c1ac498a75a9e6ac6a0a557f9812394aa4442e195e8039249543c8

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-crt-filesystem-l1-1-0.dll

MD5 712c104617ef0b2adcf6aa3a0117d7df
SHA1 14a158be1051a01637a5320b561bec004f672fe5
SHA256 8289c5306b1dd857e97275611864089986600439cac79babb2466fbc08254cb4
SHA512 62a7a0c5460859880f20ca8a80c5f0cc3f7fcbc00b51d1138e6e44dd988c4fdb5eab59eecc9bf74d1ecaccddb5dc0b35e0be709d8e2599a835aff157ef631ace

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-crt-convert-l1-1-0.dll

MD5 d8ad7429849045db1da31d30b545c6a0
SHA1 2d13798b365d06c085ea966d84cd3f127d1c7bc8
SHA256 a864aad44892a4735aef3ff76f594715291b74e8ab15fa3857f1d6168d4b7e3a
SHA512 522f7cef3b9bb32814fe35bdef8bf0a816a1db8f427d30039429ce3ba666ddfb8459a777f5dd796bfb816d8f454c5f9aff8cb015b66c87808aa5cd301fc995b0

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-crt-conio-l1-1-0.dll

MD5 018f9ce13d833d7830ee2d02239c1161
SHA1 4a544dc22706b999ceeb9477f027068630281075
SHA256 451e761abe2b6031574d02bd7b70a609c62d12757b9c2eebbcd815e66e5f2a4f
SHA512 7574f777508761e64a68cb19a56703987891d94c30622e9599fa132c72e687d55ce7f2822d2d6722132b80dc34dbed995d085573eddca8705cbd989605caa811

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-util-l1-1-0.dll

MD5 5c938aa1d32aada7336717a3bfe2cbad
SHA1 50ab7b54cfeefa470ea8d31d14cb18673c1e97a7
SHA256 edc5f6bb8cd3e74c0b065ebef81f6ea22050c585ffabfac93fa5594b22282b26
SHA512 ec01969aa1b4d62198765b670f1bb59aa42142f9a8ace1302e0fe49a43651ce96953babe44772d49040863f96fdfcc578fff1320f797351077209b9badc100ec

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-timezone-l1-1-0.dll

MD5 dd86613bbc3da5e41d8bd30803d87c1f
SHA1 35690b9b0fe48f045568e25221694be041f56d4f
SHA256 2312923d7e07c1f58f457ac434b89c01ce675ff42d74bb279326d6c573f675ed
SHA512 6d4a29c99e819368389a9347a719e78125dfbc3166af85425db81f38833b57ba28251472dd42db974876bcf8bc73465d638678b06e3482ceb36c19b943f41ca4

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-sysinfo-l1-1-0.dll

MD5 72ddeb5483ebf2b74bdf226fd907dfa4
SHA1 dcfabbeab02e3b2a6658afb422c5526b0588dd4e
SHA256 3c86ac8dd9c84d94e205f3a3751521ec88a4653b3f42a9fd8c724adabaacb316
SHA512 507d63174a38d70aecefb8117f21823040fe363949d0f1bf1253934debe7e0e775615efc8ac149022a074bb6e01314dfb62df550e04ea7b6e6241b7891f5717a

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-synch-l1-2-0.dll

MD5 a5c5e0015b39d058dd3ba707ddb2797d
SHA1 075d66ab5660b22b48129f7bcde7eaf24e6c3e65
SHA256 7eb43d2339d07858f4c95ea648234d44722e86262f1971ef5fa4995a1ca2e642
SHA512 86c0541e82c622a7d8ab74499d1ad56e76f270dc6bcf7d94cae3a7451b94c030bab172ad04b4f7b489d7f0649def9eea2512f8361d94ac4afa0fde3527656020

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-synch-l1-1-0.dll

MD5 dccb8e4632e84e12fdced9489e8db62f
SHA1 17d50eecc039c225965bcea198f83cca408ba5e0
SHA256 7e7fe561d2733b373cf74cb017a30c753c95ed312d3881bfee33e70ebec3abc1
SHA512 3661593b912d7b9c9b7b65d8465c492091ca036d634882e4db7dd7ea5e3500edde5997c13ba9d1a6d2695b9ae89eec505f304ad9759c0f73bd717fa9969e4a11

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-string-l1-1-0.dll

MD5 5f6e50a3235783de647ccbd5d20f1ce7
SHA1 c5af12af034df61e293f3262fbc31ee24c9df02e
SHA256 e54b9dfdda851d3e1afecdf9f88fc30bffc658a533f5dff362ea915dfa193c58
SHA512 ec9dafbf04606eaf641fb376a12e9e2415c83b7a6a2d348d1f54f8968204cac4b41620da96a6161a651ba782a4204eb7ab9e9540456b45f9445f7e104efbb84c

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-rtlsupport-l1-1-0.dll

MD5 1645c51ed436440b51ec2ab21596a953
SHA1 001bef9899617f0b961cc645ed85c30a0606f6bf
SHA256 eb6ead70e58b3d7bd40528a3944ce6389f3140622b1e264e216ee22aefc26689
SHA512 b50a134f1cc52e6395d702ac25e87de490ac4aa07300a785afbc066dfdd1b28acb112003b1725033075fc97d9ed9878bcdb0f3348795821dca2492f625390d8d

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-profile-l1-1-0.dll

MD5 bc5385bc13db467fa89b1ac8ba7fb486
SHA1 b44bd2eaa8fb086399125c0349a3e2102fc16154
SHA256 ffd90534607f02b049244fc4acdb8537c4d8a5c87a7d4e3fa0f3b82dad10bb66
SHA512 6653c716e1abd56136bce0252ab928b29c0f316973009c357fb458b414a6e652e4c9e74b0b3ca3c4b534c0186a20f2e4f97a8b1e1bba4883b91b21127c6f1e30

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-processthreads-l1-1-1.dll

MD5 0f99a725b93375f0ba8795e67e5a4fdf
SHA1 9825f0ec9cc4ba99471f4587d4bf97f7083d5f93
SHA256 be77a15dcaf73a7c1be6c62f57e79ef7bbc305e1b7753a4345ba1d88851dba08
SHA512 f95b6472b78f2bea732c6cc4933c83da7cbbf3eec67544b9faf86c6d6183c23e47afadb23e78420ed2dcec7ddde819e0fcb14345614c5acb3d959fca7c5a7468

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-processthreads-l1-1-0.dll

MD5 9d0f94055e51b559e47bc7124e8a9b54
SHA1 47d1fa7c3de9ca19e7dad7adee04ab5fb2dcb33c
SHA256 248e4c840c00327ed84edb13a75f826d0cbd412a288dab6bfa386476589053b3
SHA512 5e53c1ff3c2dde843507e00be0b66521c3d225d3fb405e8d52928706b2711ae189cf7488eb8b9e0fcd5419f93c0710c488e78ba0680ef47268817204a824827d

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-processenvironment-l1-1-0.dll

MD5 2a183a87968681d137d86be383c3f68c
SHA1 6d70085fc5f07d7f13ccd6591ac3c1179d4a2617
SHA256 5f6905a9b252c955c217a9d3ccfdd390ace9a2b5d0977447efb3a1ec643684db
SHA512 b2691eb6819785c535eab0798ff1442cbd5f485a9a2182c9a97fd6675a076783fb208979b463cb106ba15cdfb60d68dc0a7889aa6eb8bf5bd746015583e68362

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-namedpipe-l1-1-0.dll

MD5 301c2db0287d25844f0ed8119748f055
SHA1 5eaeff224c0f1dd5e801ea4fe5698233010d38b9
SHA256 44aeff16fcc3fa571e490b277c98dfa6352bc633de1ced8ab454a629655a8295
SHA512 3abb2fdddde2d08f38a0e22d3d61dfbf0990d7834ce80a55fb5c6fa68ae523bafab8ee7067c087a802f52fe8f506fe04d6b5b77d3b584cd519741524453c6f81

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-memory-l1-1-0.dll

MD5 c3fbc0bd499263dbc6761e7e34ca6e3d
SHA1 c6f6fc8f3d34b73d978090973fac912f5171a8cd
SHA256 ea438ac5926d5eb96999440dc890b24974926230c2a4b788c71ac765bdabd72d
SHA512 656da6d4a9717401ca8e31f5b62352c50a03f9e149cda2268295133c631600f6418758645f0f81fa596ddb3a9927b0759291ae64c9d330026a00b4cc3f6d1ab6

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-localization-l1-2-0.dll

MD5 09fed91680050e3149c29cf068bc10e5
SHA1 e9933b81c1d7b717f230ea98bb6bafbc1761ec4a
SHA256 3c5900c9e7fbada56e86d8973a582771dde6bff79ca80ae05920a33a2cc435df
SHA512 e514590385561731f2ad18afd6bcefac012ea8061a40b6ccfda4e45ff5768617b2e1b06e849e8a640a10ca59039e89ba88cac5d3b7ff088968eb4bc78e212d3a

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-libraryloader-l1-1-0.dll

MD5 cc56472bc6e4f1326a5128879ffe13cc
SHA1 636a4b3a13f1afff9e4eda1d2e6458e2b99221a7
SHA256 b4cf594dabb6c5255755a0b26a2ff5a2ac471818580f340f0432dbb758b34185
SHA512 baa0a6d83245f438548e2c546f89d2fb367d3492bec526324a9efb96accfa67602bc401211fc4574cb71377aaebee2ee9b13b562fcd3cf56fc983ae7faa12613

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-interlocked-l1-1-0.dll

MD5 2a3d1be9d329d76a89679f8cb461429f
SHA1 37716d8bdb2cfa84bedaad804979874ef50b6330
SHA256 21c91b58166c8066d5c85c97da82b496b45fa9ed3a1d6b76db85aa695a7cd772
SHA512 46230a42e282534fa4898bfc4271e5098856e446c505475e5226a4e5d95685ddc5fc029c20ba7129cb76ac5fb05ea0a449a092a4b546a00c060db0efb737958f

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-heap-l1-1-0.dll

MD5 51de1d1929921f8465fb92e884d675e0
SHA1 977e991fcf396f606ec06260d52e2d6ab39287cc
SHA256 ad09fbff3441c744c6a3c0acec7b0269f764ea7da6aa467911e812f042c6af15
SHA512 6c2efb80d1863e6a991fcd385f3276ec4f20215a99c1ce73947adc15c073d58405faebc229f29c4befba544438b8a9f38e5e2816ab708e3cfeee0d08327237d1

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-handle-l1-1-0.dll

MD5 d0f562394866e238d2df761bc4cce7be
SHA1 613c83d4efbc8306d2f776535fd60660e7f3b457
SHA256 6af859139a2873c8c7b681174ef620b13f71f3e879b39edaee66b20ae018ae4f
SHA512 7a2be6fe33b1fee83ec4072fe9e8ab36545d64fe2211a957d47516d8e71f9ddc6dc13b1aa3db0a3d9cb34c0eab023149a427172999c069b91cad4753eca42085

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-file-l2-1-0.dll

MD5 e1d37d21f7875483ae0d187032d5714c
SHA1 51a945a9e6ccf994781a028cd07ab8ee820f542c
SHA256 1076a19f2a42a35c8639fb1ce1666d046e0fd259142f7e645e350211d9d6390f
SHA512 77973d6e5e6ad68b304f50184a95be9d4993338f4f69e07c11275951b2fcfdc02c061182d1a7a394dc18fe77d6d021dd9e8e17cdfbbb8d0c77752c6df1979011

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-file-l1-1-0.dll

MD5 1f22501f6bd7ebed5f96cfd0a5390d7f
SHA1 092eca4840f9de5e99f01290cc167cc2c07b0fc7
SHA256 198dd97c0edc412500e890400ea8d2890a6155766b85278e6e7602366d70a479
SHA512 a7a998dc379a0505827e1362eb409f1421dae65987387a78901255f1683f69f56a2d28c077f90eded1c9ed19e4c84564ddabeca284a8cc08275619250a9d5da4

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-fibers-l1-1-0.dll

MD5 49ca161ffc4094bd643adb65a03f6108
SHA1 0bc09cde835fbcf1e1056ad2ddc284f65a3c8b57
SHA256 d04306791507e0284b46b64b69c34ca9c238e270c039caeb0e96cf13b3b2cae2
SHA512 0a94f7c308b02feb72e3323e876702587b7dc56d7f786c3bffef2a6325144c59581a2b48fabc064e73e1d058d6b1f64061bddbd55970a330c7c658a24a81863d

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-errorhandling-l1-1-0.dll

MD5 95305ac137745d11c5805d162f3da695
SHA1 b80f1683a450834d14455dceffd10048ef0606f4
SHA256 35c5aaf1092e406db5cae36cb5a571b82936bfd333d84ccf672f7d8e72a86387
SHA512 fdbaef161e7d4cf4b905bda7a11a4b9033952d5a94c6bce8322732b16d9dca11634a54f28e1591da88a643fae635fa9c41c4e94bcca83f9ba7cf23730c119c2f

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-debug-l1-1-0.dll

MD5 451e40fad4a529da75abccdc9723a9a8
SHA1 e3ef32218a63c91b27ca2a24bc6ea8410677562c
SHA256 c55da85bc6a3c1fca3eab4c0fdb918d35b466b3aa86d2c28233d117bde3d36c5
SHA512 50135031cf10ce011a9595688bbb7b193611d253cc6586e9337321b61de8fef5f9cabb3a217113c6e71013ba40b6f7854640dff8749f4f8a0068be4e85a1908e

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-datetime-l1-1-0.dll

MD5 51a1bef712620a98219f7a1308523665
SHA1 30f6834d7a30af8c13c993f7ca9eda2f9c92a535
SHA256 12ab9012176def0e9ed6c19847a0dbb446b6a2575f534b0f1d9c3e1e2a6fcf72
SHA512 bcb36b2435536a92a4e7c3bd8c929796ddb317c728ca87ae1e641b093fe2f69fd7671b33d8526c165b598c8b79f78367ed93e3f08fcd6b9f9285caf867049dcd

C:\Users\Admin\AppData\Local\Temp\_MEI7282\api-ms-win-core-console-l1-1-0.dll

MD5 4db53fe4fa460e376722d1ef935c3420
SHA1 b17f050e749ca5b896a1bdafd54c6cd88d02ec5b
SHA256 041d2a89986d9ea14ce9b47083fd641e75bc34ee83b1f9b9e0070d0fa02fb4c6
SHA512 091d49696cfad5aa9e60eda148a09e4c1bfd84713eb56a06bb2c052b28e2e8cafa8d0a61a01d39a49e93444afaa85439f29360c52af7c3a0e3b53db1613c0b8d

memory/2288-1388-0x00007FFE9F4A0000-0x00007FFE9F56D000-memory.dmp

memory/2288-1387-0x00007FFE9FA70000-0x00007FFE9FAA3000-memory.dmp

memory/2288-1389-0x00007FFEA4620000-0x00007FFEA462D000-memory.dmp

memory/2288-1393-0x00007FFE8F130000-0x00007FFE8F24B000-memory.dmp

memory/2288-1392-0x00007FFE9FA40000-0x00007FFE9FA67000-memory.dmp

memory/2288-1391-0x00007FFEA44D0000-0x00007FFEA44DB000-memory.dmp

memory/2288-1390-0x00007FFE8F780000-0x00007FFE8FE44000-memory.dmp

memory/2288-1399-0x00007FFE9F7C0000-0x00007FFE9F7CB000-memory.dmp

memory/2288-1398-0x00007FFE9F7D0000-0x00007FFE9F7DC000-memory.dmp

memory/2288-1397-0x00007FFE9F7E0000-0x00007FFE9F7EB000-memory.dmp

memory/2288-1396-0x00007FFE9F7F0000-0x00007FFE9F7FB000-memory.dmp

memory/2288-1394-0x00007FFEA55B0000-0x00007FFEA55D5000-memory.dmp

memory/2288-1395-0x00007FFEA0690000-0x00007FFEA069F000-memory.dmp

memory/2288-1400-0x00007FFE9FBC0000-0x00007FFE9FBED000-memory.dmp

memory/2288-1401-0x00007FFE9F7B0000-0x00007FFE9F7BC000-memory.dmp

memory/2288-1417-0x00007FFEA4750000-0x00007FFEA475D000-memory.dmp

memory/2288-1416-0x00007FFE9F670000-0x00007FFE9F67C000-memory.dmp

memory/2288-1415-0x00007FFE9F470000-0x00007FFE9F486000-memory.dmp

memory/2288-1421-0x00007FFE96510000-0x00007FFE96532000-memory.dmp

memory/2288-1420-0x00007FFE9EAF0000-0x00007FFE9EB04000-memory.dmp

memory/2288-1419-0x00007FFE9ED10000-0x00007FFE9ED22000-memory.dmp

memory/2288-1418-0x00007FFE9FA70000-0x00007FFE9FAA3000-memory.dmp

memory/2288-1414-0x00007FFE9F490000-0x00007FFE9F49C000-memory.dmp

memory/2288-1413-0x00007FFE9F640000-0x00007FFE9F652000-memory.dmp

memory/2288-1412-0x00007FFE9F660000-0x00007FFE9F66D000-memory.dmp

memory/2288-1411-0x00007FFE9F680000-0x00007FFE9F68C000-memory.dmp

memory/2288-1410-0x00007FFE9F720000-0x00007FFE9F72B000-memory.dmp

memory/2288-1409-0x00007FFE9F750000-0x00007FFE9F75B000-memory.dmp

memory/2288-1408-0x00007FFE9F760000-0x00007FFE9F76C000-memory.dmp

memory/2288-1407-0x00007FFE9F770000-0x00007FFE9F77E000-memory.dmp

memory/2288-1406-0x00007FFE9F780000-0x00007FFE9F78C000-memory.dmp

memory/2288-1405-0x00007FFE9F790000-0x00007FFE9F79C000-memory.dmp

memory/2288-1404-0x00007FFE9F7A0000-0x00007FFE9F7AB000-memory.dmp

memory/2288-1403-0x00007FFE8F250000-0x00007FFE8F779000-memory.dmp

memory/2288-1402-0x00007FFE9FBA0000-0x00007FFE9FBB4000-memory.dmp

memory/2288-1423-0x00007FFE9BB60000-0x00007FFE9BB77000-memory.dmp

memory/2288-1422-0x00007FFE9F4A0000-0x00007FFE9F56D000-memory.dmp

memory/2288-1424-0x00007FFE99D50000-0x00007FFE99D69000-memory.dmp

memory/2288-1426-0x00007FFE90BA0000-0x00007FFE90BB1000-memory.dmp

memory/2288-1425-0x00007FFE964C0000-0x00007FFE9650C000-memory.dmp

memory/2288-1428-0x00007FFE90B80000-0x00007FFE90B9E000-memory.dmp

memory/2288-1427-0x00007FFEA0690000-0x00007FFEA069F000-memory.dmp

memory/2288-1430-0x00007FFE8EE30000-0x00007FFE8EE69000-memory.dmp

memory/2288-1429-0x00007FFE8EE70000-0x00007FFE8EECD000-memory.dmp

memory/2288-1431-0x00007FFE8EE00000-0x00007FFE8EE29000-memory.dmp

memory/2288-1432-0x00007FFE8EDD0000-0x00007FFE8EDFE000-memory.dmp

memory/2288-1434-0x00007FFE8EC20000-0x00007FFE8ED9F000-memory.dmp

memory/2288-1433-0x00007FFE8EDA0000-0x00007FFE8EDC4000-memory.dmp

memory/2288-1436-0x00007FFE8EC00000-0x00007FFE8EC18000-memory.dmp

memory/2288-1435-0x00007FFE96510000-0x00007FFE96532000-memory.dmp

memory/2288-1441-0x00007FFE8EBD0000-0x00007FFE8EBDB000-memory.dmp

memory/2288-1440-0x00007FFE8EBE0000-0x00007FFE8EBEC000-memory.dmp

memory/2288-1439-0x00007FFE8EBF0000-0x00007FFE8EBFB000-memory.dmp

memory/2288-1438-0x00007FFE95E10000-0x00007FFE95E1B000-memory.dmp

memory/2288-1437-0x00007FFE9BB60000-0x00007FFE9BB77000-memory.dmp

memory/2288-1445-0x00007FFE8EB90000-0x00007FFE8EB9C000-memory.dmp

memory/2288-1459-0x00007FFE8EAF0000-0x00007FFE8EAFC000-memory.dmp

memory/2288-1458-0x00007FFE8EDD0000-0x00007FFE8EDFE000-memory.dmp

memory/2288-1457-0x00007FFE8EB00000-0x00007FFE8EB12000-memory.dmp

memory/2288-1456-0x00007FFE8EE00000-0x00007FFE8EE29000-memory.dmp

memory/2288-1455-0x00007FFE8EC20000-0x00007FFE8ED9F000-memory.dmp

memory/2288-1454-0x00007FFE8EB20000-0x00007FFE8EB2D000-memory.dmp

memory/2288-1453-0x00007FFE8EB30000-0x00007FFE8EB3C000-memory.dmp

memory/2288-1452-0x00007FFE8EB40000-0x00007FFE8EB4C000-memory.dmp

memory/2288-1451-0x00007FFE90B80000-0x00007FFE90B9E000-memory.dmp

memory/2288-1450-0x00007FFE8EB50000-0x00007FFE8EB5B000-memory.dmp

memory/2288-1449-0x00007FFE8EB60000-0x00007FFE8EB6B000-memory.dmp

memory/2288-1448-0x00007FFE8EB70000-0x00007FFE8EB7C000-memory.dmp

memory/2288-1447-0x00007FFE8EB80000-0x00007FFE8EB8E000-memory.dmp

memory/2288-1446-0x00007FFE964C0000-0x00007FFE9650C000-memory.dmp

memory/2288-1444-0x00007FFE8EBA0000-0x00007FFE8EBAC000-memory.dmp

memory/2288-1443-0x00007FFE8EBB0000-0x00007FFE8EBBB000-memory.dmp

memory/2288-1442-0x00007FFE8EBC0000-0x00007FFE8EBCC000-memory.dmp

memory/2288-1461-0x00007FFE9E0D0000-0x00007FFE9E106000-memory.dmp

memory/2288-1460-0x00007FFE8EDA0000-0x00007FFE8EDC4000-memory.dmp

memory/2288-1462-0x00007FFE9F140000-0x00007FFE9F420000-memory.dmp

memory/2288-1463-0x00007FFE8EBD0000-0x00007FFE8EBDB000-memory.dmp

memory/2288-1464-0x00007FFE8C9F0000-0x00007FFE8EAE3000-memory.dmp

memory/2288-1465-0x00007FFEA8D00000-0x00007FFEA8D17000-memory.dmp

memory/2288-1466-0x00007FFEA0730000-0x00007FFEA0751000-memory.dmp

memory/2288-1467-0x00007FFEA0700000-0x00007FFEA0722000-memory.dmp

memory/2288-1469-0x00007FFEA06D0000-0x00007FFEA0700000-memory.dmp

memory/2288-1468-0x00007FFE9F8E0000-0x00007FFE9F979000-memory.dmp

memory/2288-1471-0x00007FFE9F0F0000-0x00007FFE9F131000-memory.dmp

memory/2288-1470-0x00007FFE9FC50000-0x00007FFE9FC81000-memory.dmp

memory/2288-1472-0x00007FFEA8CE0000-0x00007FFEA8CFA000-memory.dmp

memory/2288-1473-0x00007FFE9F0D0000-0x00007FFE9F0E4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3poy2nu5.35x.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2288-1500-0x00007FFE8F780000-0x00007FFE8FE44000-memory.dmp

memory/2288-1540-0x00007FFE90BA0000-0x00007FFE90BB1000-memory.dmp

memory/2288-1539-0x00007FFE964C0000-0x00007FFE9650C000-memory.dmp

memory/2288-1538-0x00007FFE99D50000-0x00007FFE99D69000-memory.dmp

memory/2288-1537-0x00007FFE9BB60000-0x00007FFE9BB77000-memory.dmp

memory/2288-1536-0x00007FFE96510000-0x00007FFE96532000-memory.dmp

memory/2288-1535-0x00007FFE9EAF0000-0x00007FFE9EB04000-memory.dmp

memory/2288-1534-0x00007FFE9ED10000-0x00007FFE9ED22000-memory.dmp

memory/2288-1533-0x00007FFE9F470000-0x00007FFE9F486000-memory.dmp

memory/2288-1532-0x00007FFE9F490000-0x00007FFE9F49C000-memory.dmp

memory/2288-1531-0x00007FFE9F640000-0x00007FFE9F652000-memory.dmp

memory/2288-1530-0x00007FFE9F660000-0x00007FFE9F66D000-memory.dmp

memory/2288-1528-0x00007FFE9F680000-0x00007FFE9F68C000-memory.dmp

memory/2288-1527-0x00007FFE9F720000-0x00007FFE9F72B000-memory.dmp

memory/2288-1526-0x00007FFE9F750000-0x00007FFE9F75B000-memory.dmp

memory/2288-1525-0x00007FFE9F760000-0x00007FFE9F76C000-memory.dmp

memory/2288-1524-0x00007FFE9F770000-0x00007FFE9F77E000-memory.dmp

memory/2288-1523-0x00007FFE9F780000-0x00007FFE9F78C000-memory.dmp

memory/2288-1522-0x00007FFE9F790000-0x00007FFE9F79C000-memory.dmp

memory/2288-1521-0x00007FFE9F7A0000-0x00007FFE9F7AB000-memory.dmp

memory/2288-1520-0x00007FFE9F7B0000-0x00007FFE9F7BC000-memory.dmp

memory/2288-1519-0x00007FFE9F7C0000-0x00007FFE9F7CB000-memory.dmp

memory/2288-1518-0x00007FFE9F7D0000-0x00007FFE9F7DC000-memory.dmp

memory/2288-1517-0x00007FFE9F7E0000-0x00007FFE9F7EB000-memory.dmp

memory/2288-1516-0x00007FFE9F7F0000-0x00007FFE9F7FB000-memory.dmp

memory/2288-1515-0x00007FFEA0690000-0x00007FFEA069F000-memory.dmp

memory/2288-1506-0x00007FFE8F250000-0x00007FFE8F779000-memory.dmp

memory/2288-1514-0x00007FFE8F130000-0x00007FFE8F24B000-memory.dmp

memory/1160-3003-0x00007FFEA06E0000-0x00007FFEA0713000-memory.dmp

memory/1160-3002-0x00007FFEA8CE0000-0x00007FFEA8CED000-memory.dmp

memory/1160-3016-0x00007FFE9FBE0000-0x00007FFE9FBEC000-memory.dmp

memory/1160-3015-0x00007FFE9FC50000-0x00007FFE9FC5B000-memory.dmp

memory/1160-3014-0x00007FFE9FC60000-0x00007FFE9FC6C000-memory.dmp

memory/1160-3013-0x00007FFE9FC70000-0x00007FFE9FC7B000-memory.dmp

memory/1160-3012-0x00007FFE9FC80000-0x00007FFE9FC8C000-memory.dmp

memory/1160-3011-0x00007FFEA02A0000-0x00007FFEA02AB000-memory.dmp

memory/1160-3010-0x00007FFEA0690000-0x00007FFEA069B000-memory.dmp

memory/1160-3009-0x00007FFEA4620000-0x00007FFEA462F000-memory.dmp

memory/1160-3008-0x00007FFE8F990000-0x00007FFE8FAAB000-memory.dmp

memory/1160-3007-0x00007FFEA06B0000-0x00007FFEA06D7000-memory.dmp

memory/1160-3006-0x00007FFEA4750000-0x00007FFEA475B000-memory.dmp

memory/1160-3005-0x00007FFEA6F40000-0x00007FFEA6F4D000-memory.dmp

memory/1160-3004-0x00007FFE9F8B0000-0x00007FFE9F97D000-memory.dmp

memory/1160-3000-0x00007FFE9EDD0000-0x00007FFE9F2F9000-memory.dmp

memory/1160-2999-0x00007FFEA0740000-0x00007FFEA0754000-memory.dmp

memory/1160-2994-0x00007FFE8FAB0000-0x00007FFE90174000-memory.dmp

memory/1160-3001-0x00007FFEA0720000-0x00007FFEA0739000-memory.dmp

memory/1160-2998-0x00007FFEA44D0000-0x00007FFEA44FD000-memory.dmp

memory/1160-2997-0x00007FFEA8CB0000-0x00007FFEA8CCA000-memory.dmp

memory/1160-2996-0x00007FFEA8CF0000-0x00007FFEA8CFF000-memory.dmp

memory/1160-2995-0x00007FFEA55B0000-0x00007FFEA55D5000-memory.dmp