Malware Analysis Report

2024-11-30 13:00

Sample ID 240810-zfb4ha1emd
Target Yenii.exe
SHA256 697a1f289621ee08e7e324183f80bb36c0e682faa6b2cac6dd5ee6f78eee5f45
Tags
pyinstaller pysilon upx evasion execution persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

697a1f289621ee08e7e324183f80bb36c0e682faa6b2cac6dd5ee6f78eee5f45

Threat Level: Known bad

The file Yenii.exe was found to be: Known bad.

Malicious Activity Summary

pyinstaller pysilon upx evasion execution persistence

Detect Pysilon

Pysilon family

Enumerates VirtualBox DLL files

Sets file to hidden

Command and Scripting Interpreter: PowerShell

Executes dropped EXE

Loads dropped DLL

UPX packed file

Adds Run key to start application

Detects Pyinstaller

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Kills process with taskkill

Suspicious behavior: EnumeratesProcesses

Views/modifies file attributes

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-08-10 20:39

Signatures

Detect Pysilon

Description Indicator Process Target
N/A N/A N/A N/A

Pysilon family

pysilon

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-08-10 20:39

Reported

2024-08-10 20:42

Platform

win7-20240704-en

Max time kernel

120s

Max time network

130s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Yenii.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2220 wrote to memory of 2364 N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe C:\Users\Admin\AppData\Local\Temp\Yenii.exe
PID 2220 wrote to memory of 2364 N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe C:\Users\Admin\AppData\Local\Temp\Yenii.exe
PID 2220 wrote to memory of 2364 N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe C:\Users\Admin\AppData\Local\Temp\Yenii.exe

Processes

C:\Users\Admin\AppData\Local\Temp\Yenii.exe

"C:\Users\Admin\AppData\Local\Temp\Yenii.exe"

C:\Users\Admin\AppData\Local\Temp\Yenii.exe

"C:\Users\Admin\AppData\Local\Temp\Yenii.exe"

Network

N/A

Files

C:\Users\Admin\AppData\Local\Temp\_MEI22202\setuptools\_vendor\importlib_metadata-8.0.0.dist-info\INSTALLER

MD5 365c9bfeb7d89244f2ce01c1de44cb85
SHA1 d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256 ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512 d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

C:\Users\Admin\AppData\Local\Temp\_MEI22202\setuptools\_vendor\jaraco.text-3.12.1.dist-info\LICENSE

MD5 141643e11c48898150daa83802dbc65f
SHA1 0445ed0f69910eeaee036f09a39a13c6e1f37e12
SHA256 86da0f01aeae46348a3c3d465195dc1ceccde79f79e87769a64b8da04b2a4741
SHA512 ef62311602b466397baf0b23caca66114f8838f9e78e1b067787ceb709d09e0530e85a47bbcd4c5a0905b74fdb30df0cc640910c6cc2e67886e5b18794a3583f

C:\Users\Admin\AppData\Local\Temp\_MEI22202\setuptools\_vendor\jaraco.text-3.12.1.dist-info\WHEEL

MD5 43136dde7dd276932f6197bb6d676ef4
SHA1 6b13c105452c519ea0b65ac1a975bd5e19c50122
SHA256 189eedfe4581172c1b6a02b97a8f48a14c0b5baa3239e4ca990fbd8871553714
SHA512 e7712ba7d36deb083ebcc3b641ad3e7d19fb071ee64ae3a35ad6a50ee882b20cd2e60ca1319199df12584fe311a6266ec74f96a3fb67e59f90c7b5909668aee1

C:\Users\Admin\AppData\Local\Temp\_MEI22202\python312.dll

MD5 36e9be7e881d1dc29295bf7599490241
SHA1 5b6746aedac80f0e6f16fc88136bcdcbd64b3c65
SHA256 ebef43e92267a17f44876c702c914aafa46b997b63223ff46b12149fd2a2616e
SHA512 090d4e9092b7fe00180164b6f84b4bd1d1a1e12dc8fea042eaa0e75cc08bb9994c91c3853bedec390208db4ef2e3447cd9be20d7dc20c14e6deb52a141d554cf

memory/2364-1365-0x000007FEF59F0000-0x000007FEF60B5000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-08-10 20:39

Reported

2024-08-10 20:42

Platform

win10v2004-20240802-en

Max time kernel

142s

Max time network

139s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Yenii.exe"

Signatures

Enumerates VirtualBox DLL files

Description Indicator Process Target
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\Yenii\Yenii.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Yenii = "C:\\Users\\Admin\\Yenii\\Yenii.exe" C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Yenii.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\Yenii.exe

"C:\Users\Admin\AppData\Local\Temp\Yenii.exe"

C:\Users\Admin\AppData\Local\Temp\Yenii.exe

"C:\Users\Admin\AppData\Local\Temp\Yenii.exe"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x3c4 0x4e8

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\Yenii\""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\Yenii\activate.bat

C:\Windows\system32\attrib.exe

attrib +s +h .

C:\Users\Admin\Yenii\Yenii.exe

"Yenii.exe"

C:\Windows\system32\taskkill.exe

taskkill /f /im "Yenii.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 13.107.21.237:443 g.bing.com tcp
US 8.8.8.8:53 133.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 81.144.22.2.in-addr.arpa udp
US 8.8.8.8:53 237.21.107.13.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 192.142.123.92.in-addr.arpa udp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp
US 150.171.27.10:443 tse1.mm.bing.net tcp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI49762\setuptools\_vendor\importlib_metadata-8.0.0.dist-info\INSTALLER

MD5 365c9bfeb7d89244f2ce01c1de44cb85
SHA1 d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256 ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512 d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

C:\Users\Admin\AppData\Local\Temp\_MEI49762\setuptools\_vendor\jaraco.text-3.12.1.dist-info\LICENSE

MD5 141643e11c48898150daa83802dbc65f
SHA1 0445ed0f69910eeaee036f09a39a13c6e1f37e12
SHA256 86da0f01aeae46348a3c3d465195dc1ceccde79f79e87769a64b8da04b2a4741
SHA512 ef62311602b466397baf0b23caca66114f8838f9e78e1b067787ceb709d09e0530e85a47bbcd4c5a0905b74fdb30df0cc640910c6cc2e67886e5b18794a3583f

C:\Users\Admin\AppData\Local\Temp\_MEI49762\setuptools\_vendor\jaraco.text-3.12.1.dist-info\WHEEL

MD5 43136dde7dd276932f6197bb6d676ef4
SHA1 6b13c105452c519ea0b65ac1a975bd5e19c50122
SHA256 189eedfe4581172c1b6a02b97a8f48a14c0b5baa3239e4ca990fbd8871553714
SHA512 e7712ba7d36deb083ebcc3b641ad3e7d19fb071ee64ae3a35ad6a50ee882b20cd2e60ca1319199df12584fe311a6266ec74f96a3fb67e59f90c7b5909668aee1

C:\Users\Admin\AppData\Local\Temp\_MEI49762\python312.dll

MD5 36e9be7e881d1dc29295bf7599490241
SHA1 5b6746aedac80f0e6f16fc88136bcdcbd64b3c65
SHA256 ebef43e92267a17f44876c702c914aafa46b997b63223ff46b12149fd2a2616e
SHA512 090d4e9092b7fe00180164b6f84b4bd1d1a1e12dc8fea042eaa0e75cc08bb9994c91c3853bedec390208db4ef2e3447cd9be20d7dc20c14e6deb52a141d554cf

C:\Users\Admin\AppData\Local\Temp\_MEI49762\VCRUNTIME140.dll

MD5 be8dbe2dc77ebe7f88f910c61aec691a
SHA1 a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA256 4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA512 0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

memory/2328-1367-0x00007FFDEC180000-0x00007FFDEC845000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI49762\base_library.zip

MD5 763d1a751c5d47212fbf0caea63f46f5
SHA1 845eaa1046a47b5cf376b3dbefcf7497af25f180
SHA256 378a4b40f4fa4a8229c93e0afee819085251af03402ccefa3b469651e50e60b7
SHA512 bb356dd610e6035f4002671440ce96624addf9a89fd952a6419647a528a551a6ccd0eca0ee2eeb080d9aad683b5afc9415c721fa62c3bcddcb7f1923f59d9c45

C:\Users\Admin\AppData\Local\Temp\_MEI49762\_ctypes.pyd

MD5 1a546aaa7d44f48daef4750a679fe22f
SHA1 0aaa6657b15c79b3713229e61aec5d0e16e5b404
SHA256 b1ed56b8aab1dc0e4021bb08b53ac82fa9bf0c56f171287c55241617dd90bc5b
SHA512 338b6210bbde57ac6bbd032f8d65b90fe43d1509c74d138766a50490ee0ff93b5c94ec29fb8b8575f602304a342aa195dfff7b9bc22bb20e78545521ce0cd2e9

C:\Users\Admin\AppData\Local\Temp\_MEI49762\python3.DLL

MD5 8dbe9bbf7118f4862e02cd2aaf43f1ab
SHA1 935bc8c5cea4502d0facf0c49c5f2b9c138608ed
SHA256 29f173e0147390a99f541ba0c0231fdd7dfbca84d0e2e561ef352bf1ec72f5db
SHA512 938f8387dcc356012ac4a952d371664700b110f7111fcc24f5df7d79791ae95bad0dbaf77d2d6c86c820bfd48a6bdbe8858b7e7ae1a77df88e596556c7135ed4

C:\Users\Admin\AppData\Local\Temp\_MEI49762\libffi-8.dll

MD5 013a0b2653aa0eb6075419217a1ed6bd
SHA1 1b58ff8e160b29a43397499801cf8ab0344371e7
SHA256 e9d8eb01bb9b02ce3859ba4527938a71b4668f98897d46f29e94b27014036523
SHA512 0bd13fa1d55133ee2a96387e0756f48133987bacd99d1f58bab3be7bffdf868092060c17ab792dcfbb4680f984f40d3f7cc24abdd657b756496aa8884b8f6099

memory/2328-1375-0x00007FFDFBD10000-0x00007FFDFBD35000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI49762\_lzma.pyd

MD5 385a812072bc56d47823360908c2e5ca
SHA1 e8f758dfbd6ed8a82d614343116d9e9c164ce021
SHA256 4943f6912c4ddd1f6d11fa6ea7f619bf852569efe013558105e7a26518d466fd
SHA512 adc6ebda1eb2a51d5bb109c0019150827a3606399f450c250309fce50ae81a820a5a813657e8f4fa6eb7ccc7cb2a5f332aa23db6f12baec156ffc3dd1a32879d

memory/2328-1425-0x00007FFDFBCA0000-0x00007FFDFBCB4000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI49762\libcrypto-3.dll

MD5 8fed6a2bbb718bb44240a84662c79b53
SHA1 2cd169a573922b3a0e35d0f9f252b55638a16bca
SHA256 f8de79a5dd7eeb4b2a053315ab4c719cd48fe90b0533949f94b6a291e6bc70fd
SHA512 87787593e6a7d0556a4d05f07a276ffdbef551802eb2e4b07104362cb5af0b32bffd911fd9237799e10e0c8685e9e7a7345c3bce2ad966843c269b4c9bd83e03

memory/2328-1424-0x00007FFDFBCC0000-0x00007FFDFBCED000-memory.dmp

memory/2328-1427-0x00007FFDEBC50000-0x00007FFDEC179000-memory.dmp

memory/2328-1423-0x00007FFDFBCF0000-0x00007FFDFBD0A000-memory.dmp

memory/2328-1422-0x00007FFE00D40000-0x00007FFE00D4F000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI49762\_hashlib.pyd

MD5 c2ac87c77fb85f1c09164b9b854563b2
SHA1 f1bf0ef87442db135b19a3f21d37285994315c81
SHA256 e8927da7aa0909244eff9b82aec82f2cd597fcab41ba60fd8a08f3cb376dc888
SHA512 a40068dbb8a31c443bd0d7f037bb77561782b07e6f49ef8eeefb2cdc35dc58ab0f3b80194f0da26eb42b525ca845891e0aa05a3b4a907622c30cf66583381cef

C:\Users\Admin\AppData\Local\Temp\_MEI49762\_wmi.pyd

MD5 cedc59ac09061537eb289f769bad7b9e
SHA1 5ae74eab2e9d076e2659da9f1295274ad2abd0cb
SHA256 48570c1739f9ae4880a73ef8fac1e422b4edde95de68b87bb31eac0256928fa0
SHA512 314daab6bb5fdeddb325f9834b8f87027c711371ff1463b74f6ab0ecb92cc5db8934c4775eb0dc7df46dbda5145e00f93cb667aa6e693ae35f4d3c3cf2b52762

C:\Users\Admin\AppData\Local\Temp\_MEI49762\_uuid.pyd

MD5 8f5402bb6aac9c4ff9b4ce5ac3f0f147
SHA1 87207e916d0b01047b311d78649763d6e001c773
SHA256 793e44c75e7d746af2bb5176e46c454225f07cb27b1747f1b83d1748d81ad9ac
SHA512 65fdef32aeba850aa818a8c8bf794100725a9831b5242350e6c04d0bca075762e1b650f19c437a17b150e9fca6ad344ec4141a041fa12b5a91652361053c7e81

C:\Users\Admin\AppData\Local\Temp\_MEI49762\_tkinter.pyd

MD5 81ccc49a344eb0d332f0b1da9c9f3ddb
SHA1 59a8e41a03eec92f65c44e288e32497aebbd8bc6
SHA256 7f1acba0744ebbd10d67d6cc4ee1a4e8a67ff6e53c7d663e0a5ef0bc7f0bb90c
SHA512 c66d015130e518ef05d7300dff8ad69ec8290a38ffbb5155de539d0b800091f67be7787905ebe7c46ba04d4160aec7825e05fa14e58a517c44083d3f15ce5bb5

C:\Users\Admin\AppData\Local\Temp\_MEI49762\_ssl.pyd

MD5 b09de65cadc4718032551525b3b4ee84
SHA1 c685ab6985bd8ba5e85a1575baa57501e9181329
SHA256 d85b9564b554d2daae8ab96e6d08e95c23e4d819e943d76727e21972aae1c5d1
SHA512 2f70b8c50d09952163f63e8e84f74b7a91f42f58bec11d20dc663e1b04f62c0ac5ddb6ddd497723fc26c2cf19684d4eea6eb0878bf7f22863582a774cc09de06

C:\Users\Admin\AppData\Local\Temp\_MEI49762\_sqlite3.pyd

MD5 6a04a1dfa71c5fc80e6561feb2ecf77d
SHA1 ad8fa558ea3e10344e48dd94072464d7b6feb908
SHA256 7f8ae2ae9acb14285e0bab70d817b3a5ab9ff531484fd18bc2e84ca19c66bb01
SHA512 fc95c87f29f6c54a64a26091b03c8ab7328d81298a7f12afbc38d8e7c05c5a0d4d4d7b33ef2c6d94d921772e5a85d2419e5b3356cf25cbdb9fa4a65050b05aeb

C:\Users\Admin\AppData\Local\Temp\_MEI49762\_socket.pyd

MD5 794b03a9d66e2c20b3c5b6da1e491f03
SHA1 11371fd5e491e399386ee9430c1c7c1f087d8034
SHA256 9557520c96d984e13500d2a673b342fde071502a418e9f606c6c9bdd83723f80
SHA512 c00923b0fdbb8a144a2d2d1a9fa6ec057262082a98de84a088d7cf2fd8c20440f8a8b40eb2c54d6b98cf3f9ae7c07f61aa6cf8c68e208eeb833bc7766c877cf9

C:\Users\Admin\AppData\Local\Temp\_MEI49762\_queue.pyd

MD5 ff5aa080771afaf13ba28c249a2a7f31
SHA1 18463bba2ac965e51a85724f7cbae09f145d8e75
SHA256 088bcabbf20ba558b891c949b29204fc5cad9ada37794a4d81608fade2f68e4d
SHA512 9d5bc7806717ce8a04078181433a8a29e0a869ba4310030d16e52f0ef33f8e7374ea571ca764dafc9288e65c672cee11d7a0a66a8ca852ba5d9490330651bd01

C:\Users\Admin\AppData\Local\Temp\_MEI49762\_overlapped.pyd

MD5 4be51674f1bc4bf44fa85580069b596a
SHA1 83c9a8f117319286dbd60fa5be3e0d5137b6b08e
SHA256 39768fc9e5b5c7c553d8b67d6529a42835e3dea0bb85dc051ed56d76eaa37d6e
SHA512 64e8dfe616fdd785f03657827b156686cafa26b41a8baaa0a78108aeea11dc97d4cc46012bec6140685f476c5f299a928ac26353f246918fcb754558d08c3136

C:\Users\Admin\AppData\Local\Temp\_MEI49762\_multiprocessing.pyd

MD5 9ff35affc5bb5884357a1638e037550c
SHA1 0c23f98b11a609f19de64ae84e8bf457a00ecf20
SHA256 fde0d143290783e5c21cb91b9edd2f51513f25c365b70b54857d0d9f50947ed7
SHA512 d4ebaca2f9b17ffda750f5cd1e2c6627db38884cd7f6e52ac0496a1e64489b61df56f0344ccb7fa29c547a464315c573314d6038048cb53b46ff6ec3d75495df

C:\Users\Admin\AppData\Local\Temp\_MEI49762\_elementtree.pyd

MD5 7fa4283e02e5df8440e5bab00734daec
SHA1 d65be448b03419e12358479a6d9f0204e78f6c7d
SHA256 9bef538ecf64b57bdf3b3276708cc05930d402891618b46e73a5c31490f22469
SHA512 c37cbea70416798db586c5cac7174b72ab47c90b2740b4b2c49cd875455f2bf5b733f700cf7610b69e7f9de9454860266df6966bfb734a552e1c8f4a2515197b

C:\Users\Admin\AppData\Local\Temp\_MEI49762\_decimal.pyd

MD5 0cd50be9ed60afdfaad0497854db6d0d
SHA1 b2514e58e5a98ca3c4e70e035810ecd06cb73b1f
SHA256 1d68f9a2c700565ff3ae3fc3956cbb8ab4fcf4fdfa7cbfb5a98aa350226505a2
SHA512 2896d5704586491105c56ecd34881601f0a65329e8fff9a8082afd406a34d3ebb74f670766f61f5fa70b2e7388d9e2a71625c9d0023af26fb6f91fb36f5d5de6

C:\Users\Admin\AppData\Local\Temp\_MEI49762\_cffi_backend.cp312-win_amd64.pyd

MD5 61ce9c98f26db0dd41616a95af93c7df
SHA1 7e6a8c41276859748d847e0f9cf81374a1b29d0a
SHA256 9b8893ee9fef73c1d8b125af11150c9988a4ff275eb01ff86edbfbf022e18936
SHA512 baedde5d10293ebb09291ed22ab8669866647239ffc368014d7bd604f5eeb5b1e4645c47bdad749b4faeb2dbb0ff2f89b3e9bcc294ff0b13b3f5f2dbaf6ff9d8

C:\Users\Admin\AppData\Local\Temp\_MEI49762\_asyncio.pyd

MD5 b7b1cab9edce355c146141010994a93d
SHA1 5d55a40e2adaa9323275828f5053e6ec5baaab0c
SHA256 dacaab596eff05ba6b2aadce45d0d59648b73cf25d060dec98695406637caf2d
SHA512 e4da70890c1506c6a47bbce5efbdb1149b5ffd1ad0f635750ee8f426bfdba2850465499b27197d1fea718192fc531cc015dc5197bfaca84c15d1f1352b9ad36c

C:\Users\Admin\AppData\Local\Temp\_MEI49762\VCRUNTIME140_1.dll

MD5 f8dfa78045620cf8a732e67d1b1eb53d
SHA1 ff9a604d8c99405bfdbbf4295825d3fcbc792704
SHA256 a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5
SHA512 ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371

C:\Users\Admin\AppData\Local\Temp\_MEI49762\unicodedata.pyd

MD5 7e6ccb19d4f019e0d8dcda1d1b51f481
SHA1 b53539c817d6b53f279dc2fbebc210331fc35430
SHA256 924def015aa801d088d83380cf02befb38d0aa69bd541f413c07cf40c59b7bde
SHA512 27a352da9a883fb5992fde7549d5b38cdf5a271a11426d4a13222dbe0c7219818dac57e65a07ba1b1d6bc49bc03ad194b16200e033194fed04f694dc9377f94e

C:\Users\Admin\AppData\Local\Temp\_MEI49762\zlib1.dll

MD5 ee06185c239216ad4c70f74e7c011aa6
SHA1 40e66b92ff38c9b1216511d5b1119fe9da6c2703
SHA256 0391066f3e6385a9c0fe7218c38f7bd0b3e0da0f15a98ebb07f1ac38d6175466
SHA512 baae562a53d491e19dbf7ee2cff4c13d42de6833036bfdaed9ed441bcbf004b68e4088bd453b7413d60faaf1b334aee71241ba468437d49050b8ccfa9232425d

C:\Users\Admin\AppData\Local\Temp\_MEI49762\tk86t.dll

MD5 c33191c40eafd44532eb2d68fa670765
SHA1 a44b786d8c716f574d04dfcb0e1c729b68348d60
SHA256 ff93ffd200748ad93077a7eb36785e250d3defd283e0dd8182ac80c24c9ea3c6
SHA512 a2096685c1516c936c2a2b894c1ebd74e7100aa83710f412b833eb6a4c33cd98f5bf06207c36c6209eafc0084df36e81febf4aaf1e46438fb7985ea9568cd84f

C:\Users\Admin\AppData\Local\Temp\_MEI49762\tcl86t.dll

MD5 c0e0e8b121c5b9ccc3f5102332bacff1
SHA1 2a16f8c6c5143cb70bf249f868d0b71a7b6a2116
SHA256 64aadb6388329d7d3387718fdad5d7591b7b091981c60865a44a4f7ec57c2705
SHA512 290d538f7906ecf71302ffa65335bc8f9509a25d7e0ea73a9e955e833db539b7810818b663f82aa0cc4703e6f283e3dadc2e3630dd83a204e21dc064c2ebdff1

C:\Users\Admin\AppData\Local\Temp\_MEI49762\sqlite3.dll

MD5 50d021c2c62240e20f6115929dc8222b
SHA1 1fcb9f659de371d476436b77405c92e8ca0be2cb
SHA256 326486760609708710de1ff95e6329958caa2bbe45b57e41bb3fb242f3c1207c
SHA512 7cf3e2c98aa3d73789ad2ebb96fbab1d54f65972847ad971c77ae7cae7ce86009f0c9100d23f564a45981fa117a43d5746f239afdeafb7b195b7761c5acab19c

C:\Users\Admin\AppData\Local\Temp\_MEI49762\select.pyd

MD5 7707f61fa9f5e225de74d55cb1021511
SHA1 73ce7161eaaf9e81233f4f034bbbb5ea9c8e438a
SHA256 ac639851261f6fe6951481a9fc1ea64e1e97c92910407296c3dbc2d888384944
SHA512 5654ffd703a0fad8f953cd59679f6a053ab42e0207a38837a722e3dba65cadbb1fd2a91b344f8596ba7470eb822759b0f6b51a1543b1810c4089444fe3127105

C:\Users\Admin\AppData\Local\Temp\_MEI49762\SDL2_ttf.dll

MD5 eb0ce62f775f8bd6209bde245a8d0b93
SHA1 5a5d039e0c2a9d763bb65082e09f64c8f3696a71
SHA256 74591aab94bb87fc9a2c45264930439bbc0d1525bf2571025cd9804e5a1cd11a
SHA512 34993240f14a89179ac95c461353b102ea74e4180f52c206250bb42c4c8427a019ea804b09a6903674ac00ab2a3c4c686a86334e483110e79733696aa17f4eb6

C:\Users\Admin\AppData\Local\Temp\_MEI49762\SDL2_mixer.dll

MD5 b7b45f61e3bb00ccd4ca92b2a003e3a3
SHA1 5018a7c95dc6d01ba6e3a7e77dd26c2c74fd69bc
SHA256 1327f84e3509f3ccefeef1c12578faf04e9921c145233687710253bf903ba095
SHA512 d3449019824124f3edbda57b3b578713e9c9915e173d31566cd8e4d18f307ac0f710250fe6a906dd53e748db14bfa76ec1b58a6aef7d074c913679a47c5fdbe7

C:\Users\Admin\AppData\Local\Temp\_MEI49762\SDL2_image.dll

MD5 25e2a737dcda9b99666da75e945227ea
SHA1 d38e086a6a0bacbce095db79411c50739f3acea4
SHA256 22b27380d4f1f217f0e5d5c767e5c244256386cd9d87f8ddf303baaf9239fc4c
SHA512 63de988387047c17fd028a894465286fd8f6f8bd3a1321b104c0ceb5473e3e0b923153b4999143efbdd28684329a33a5b468e43f25214037f6cddd4d1884adb8

C:\Users\Admin\AppData\Local\Temp\_MEI49762\SDL2.dll

MD5 ec3c1d17b379968a4890be9eaab73548
SHA1 7dbc6acee3b9860b46c0290a9b94a344d1927578
SHA256 aaa11e97c3621ed680ff2388b91acb394173b96a6e8ffbf3b656079cd00a0b9f
SHA512 06a7880ec80174b48156acd6614ab42fb4422cd89c62d11a7723a3c872f213bfc6c1006df8bdc918bb79009943d2b65c6a5c5e89ad824d1a940ddd41b88a1edb

C:\Users\Admin\AppData\Local\Temp\_MEI49762\pyexpat.pyd

MD5 71a72cd213e6756a9915afb34f7b8013
SHA1 922e306c60c34137d9428a8fbd98284afebad12f
SHA256 80f1db58145dffd83934fa92f858aa9e42cac00e3b1ff6045aeb33a4dcf77cee
SHA512 006285b75742bac90a94370016f5796bfbf1a1fc2de8b5c888f738c4667f32ce95f102b37da55662fcecbe3720765aec022afa89eec16e1f1e10b8069b621aa6

C:\Users\Admin\AppData\Local\Temp\_MEI49762\portmidi.dll

MD5 0df0699727e9d2179f7fd85a61c58bdf
SHA1 82397ee85472c355725955257c0da207fa19bf59
SHA256 97a53e8de3f1b2512f0295b5de98fa7a23023a0e4c4008ae534acdba54110c61
SHA512 196e41a34a60de83cb24caa5fc95820fd36371719487350bc2768354edf39eeb6c7860ff3fd9ecf570abb4288523d7ab934e86e85202b9753b135d07180678cd

C:\Users\Admin\AppData\Local\Temp\_MEI49762\libwebp-7.dll

MD5 b0dd211ec05b441767ea7f65a6f87235
SHA1 280f45a676c40bd85ed5541ceb4bafc94d7895f3
SHA256 fc06b8f92e86b848a17eaf7ed93464f54ed1f129a869868a74a75105ff8ce56e
SHA512 eaeb83e46c8ca261e79b3432ec2199f163c44f180eb483d66a71ad530ba488eb4cdbd911633e34696a4ccc035e238bc250a8247f318aa2f0cd9759cad4f90fff

C:\Users\Admin\AppData\Local\Temp\_MEI49762\libtiff-5.dll

MD5 ebad1fa14342d14a6b30e01ebc6d23c1
SHA1 9c4718e98e90f176c57648fa4ed5476f438b80a7
SHA256 4f50820827ac76042752809479c357063fe5653188654a6ba4df639da2fbf3ca
SHA512 91872eaa1f3f45232ab2d753585e650ded24c6cc8cc1d2a476fa98a61210177bd83570c52594b5ad562fc27cb76e034122f16a922c6910e4ed486da1d3c45c24

C:\Users\Admin\AppData\Local\Temp\_MEI49762\libssl-3.dll

MD5 37c7f14cd439a0c40d496421343f96d5
SHA1 1b6d68159e566f3011087befdcf64f6ee176085c
SHA256 b9c8276a3122cacba65cfa78217fef8a6d4f0204548fcacce66018cb91cb1b2a
SHA512 f446fd4bd351d391006d82198f7f679718a6e17f14ca5400ba23886275ed5363739bfd5bc01ca07cb2af19668dd8ab0b403bcae139d81a245db2b775770953ea

C:\Users\Admin\AppData\Local\Temp\_MEI49762\libpng16-16.dll

MD5 55009dd953f500022c102cfb3f6a8a6c
SHA1 07af9f4d456ddf86a51da1e4e4c5b54b0cf06ddb
SHA256 20391787cba331cfbe32fbf22f328a0fd48924e944e80de20ba32886bf4b6fd2
SHA512 4423d3ec8fef29782f3d4a21feeac9ba24c9c765d770b2920d47b4fb847a96ff5c793b20373833b4ff8bc3d8fa422159c64beffb78ce5768ed22742740a8c6c6

C:\Users\Admin\AppData\Local\Temp\_MEI49762\libopusfile-0.dll

MD5 2d5274bea7ef82f6158716d392b1be52
SHA1 ce2ff6e211450352eec7417a195b74fbd736eb24
SHA256 6dea07c27c0cc5763347357e10c3b17af318268f0f17c7b165325ce524a0e8d5
SHA512 9973d68b23396b3aa09d2079d18f2c463e807c9c1fdf4b1a5f29d561e8d5e62153e0c7be23b63975ad179b9599ff6b0cf08ebdbe843d194483e7ec3e7aeb232a

C:\Users\Admin\AppData\Local\Temp\_MEI49762\libopus-0.x64.dll

MD5 e56f1b8c782d39fd19b5c9ade735b51b
SHA1 3d1dc7e70a655ba9058958a17efabe76953a00b4
SHA256 fa8715dd0df84fdedbe4aa17763b2ab0db8941fa33421b6d42e25e59c4ae8732
SHA512 b7702e48b20a8991a5c537f5ba22834de8bb4ba55862b75024eace299263963b953606ee29e64d68b438bb0904273c4c20e71f22ccef3f93552c36fb2d1b2c46

C:\Users\Admin\AppData\Local\Temp\_MEI49762\libopus-0.dll

MD5 3fb9d9e8daa2326aad43a5fc5ddab689
SHA1 55523c665414233863356d14452146a760747165
SHA256 fd8de9169ccf53c5968eec0c90e9ff3a66fb451a5bf063868f3e82007106b491
SHA512 f263ea6e0fab84a65fe3a9b6c0fe860919eee828c84b888a5aa52dea540434248d1e810a883a2aff273cd9f22c607db966dd8776e965be6d2cfe1b50a1af1f57

C:\Users\Admin\AppData\Local\Temp\_MEI49762\libogg-0.dll

MD5 0d65168162287df89af79bb9be79f65b
SHA1 3e5af700b8c3e1a558105284ecd21b73b765a6dc
SHA256 2ec2322aec756b795c2e614dab467ef02c3d67d527ad117f905b3ab0968ccf24
SHA512 69af81fd2293c31f456b3c78588bb6a372fe4a449244d74bfe5bfaa3134a0709a685725fa05055cfd261c51a96df4b7ebd8b9e143f0e9312c374e54392f8a2c2

C:\Users\Admin\AppData\Local\Temp\_MEI49762\libmodplug-1.dll

MD5 2bb2e7fa60884113f23dcb4fd266c4a6
SHA1 36bbd1e8f7ee1747c7007a3c297d429500183d73
SHA256 9319bf867ed6007f3c61da139c2ab8b74a4cb68bf56265a101e79396941f6d3b
SHA512 1ddd4b9b9238c1744e0a1fe403f136a1def8df94814b405e7b01dd871b3f22a2afe819a26e08752142f127c3efe4ebae8bfd1bd63563d5eb98b4644426f576b2

C:\Users\Admin\AppData\Local\Temp\_MEI49762\libjpeg-9.dll

MD5 c22b781bb21bffbea478b76ad6ed1a28
SHA1 66cc6495ba5e531b0fe22731875250c720262db1
SHA256 1eed2385030348c84bbdb75d41d64891be910c27fab8d20fc9e85485fcb569dd
SHA512 9b42cad4a715680a27cd79f466fd2913649b80657ff042528cba2946631387ed9fb027014d215e1baf05839509ca5915d533b91aa958ae0525dea6e2a869b9e4

C:\Users\Admin\AppData\Local\Temp\_MEI49762\freetype.dll

MD5 04a9825dc286549ee3fa29e2b06ca944
SHA1 5bed779bf591752bb7aa9428189ec7f3c1137461
SHA256 50249f68b4faf85e7cd8d1220b7626a86bc507af9ae400d08c8e365f9ab97cde
SHA512 0e937e4de6cbc9d40035b94c289c2798c77c44fc1dc7097201f9fab97c7ff9e56113c06c51693f09908283eda92945b36de67351f893d4e3162e67c078cff4ec

C:\Users\Admin\AppData\Local\Temp\_MEI49762\crypto_clipper.json

MD5 8bff94a9573315a9d1820d9bb710d97f
SHA1 e69a43d343794524b771d0a07fd4cb263e5464d5
SHA256 3f7446866f42bcbeb8426324d3ea58f386f3171abe94279ea7ec773a4adde7d7
SHA512 d5ece1ea9630488245c578cb22d6d9d902839e53b4550c6232b4fb9389ef6c5d5392426ea4a9e3c461979d6d6aa94ddf3b2755f48e9988864788b530cdfcf80f

C:\Users\Admin\AppData\Local\Temp\_MEI49762\_bz2.pyd

MD5 075ae3a74a32bb5386c3524a19e3927e
SHA1 8d832da3344e5958358c24d4d31e51f6a8ddfd24
SHA256 d581bf9f92031f73ae75e21328597906db970714430e6dc44ce525cf04d5e77a
SHA512 455cbe95a369562e56bf76e2c287c52cc5327872151b1797ba3636196dc9231c6d73557d28ee1e3cf2d1c233edb61587cae41498f5d1d8b9cc9c0fdecfff3f1b

memory/2328-1431-0x00007FFDFFFB0000-0x00007FFDFFFBD000-memory.dmp

memory/2328-1430-0x00007FFDFB460000-0x00007FFDFB479000-memory.dmp

memory/2328-1435-0x00007FFDEBB80000-0x00007FFDEBC4D000-memory.dmp

memory/2328-1434-0x00007FFDFB3B0000-0x00007FFDFB3E3000-memory.dmp

memory/2328-1437-0x00007FFDFBC60000-0x00007FFDFBC6D000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI49762\charset_normalizer\md.cp312-win_amd64.pyd

MD5 191c247b7e0543cc769718232ead35da
SHA1 e3f0be22199ff1f5cf131a12c1c7a58805f2fff5
SHA256 3d393309cbc6e88919c4fd472394d7c31f26f1709dffadd1c7e8895097e6cab3
SHA512 ad0316e9430308a05672e28050bf5c23bd2f7d81e7dc97e7926cd54a9fc0ba78ba904dee87b04688e7d0377ba69892a6cea7ab9f972c08e8d9da1d7c13693f97

memory/2328-1439-0x00007FFDFBC00000-0x00007FFDFBC0B000-memory.dmp

memory/2328-1442-0x00007FFDECEE0000-0x00007FFDECFFA000-memory.dmp

memory/2328-1441-0x00007FFDF8330000-0x00007FFDF8357000-memory.dmp

memory/2328-1440-0x00007FFDEC180000-0x00007FFDEC845000-memory.dmp

memory/2328-1459-0x00007FFDF82B0000-0x00007FFDF82BC000-memory.dmp

memory/2328-1458-0x00007FFDF82C0000-0x00007FFDF82CB000-memory.dmp

memory/2328-1457-0x00007FFDF8320000-0x00007FFDF832B000-memory.dmp

memory/2328-1462-0x00007FFDF8290000-0x00007FFDF829D000-memory.dmp

memory/2328-1461-0x00007FFDFB3B0000-0x00007FFDFB3E3000-memory.dmp

memory/2328-1460-0x00007FFDF82A0000-0x00007FFDF82AC000-memory.dmp

memory/2328-1456-0x00007FFDF8EB0000-0x00007FFDF8EBC000-memory.dmp

memory/2328-1455-0x00007FFDF8EC0000-0x00007FFDF8ECB000-memory.dmp

memory/2328-1454-0x00007FFDFBCA0000-0x00007FFDFBCB4000-memory.dmp

memory/2328-1453-0x00007FFDF82D0000-0x00007FFDF82DB000-memory.dmp

memory/2328-1452-0x00007FFDF82E0000-0x00007FFDF82EC000-memory.dmp

memory/2328-1451-0x00007FFDF82F0000-0x00007FFDF82FE000-memory.dmp

memory/2328-1450-0x00007FFDF8300000-0x00007FFDF830C000-memory.dmp

memory/2328-1449-0x00007FFDF8310000-0x00007FFDF831C000-memory.dmp

memory/2328-1448-0x00007FFDEBC50000-0x00007FFDEC179000-memory.dmp

memory/2328-1447-0x00007FFDFAF70000-0x00007FFDFAF7C000-memory.dmp

memory/2328-1446-0x00007FFDFAF80000-0x00007FFDFAF8B000-memory.dmp

memory/2328-1445-0x00007FFDFB680000-0x00007FFDFB68B000-memory.dmp

memory/2328-1444-0x00007FFDFB950000-0x00007FFDFB95F000-memory.dmp

memory/2328-1443-0x00007FFDFBD10000-0x00007FFDFBD35000-memory.dmp

memory/2328-1466-0x00007FFDF2FC0000-0x00007FFDF2FD6000-memory.dmp

memory/2328-1465-0x00007FFDF8280000-0x00007FFDF828C000-memory.dmp

memory/2328-1464-0x00007FFDF3620000-0x00007FFDF3632000-memory.dmp

memory/2328-1463-0x00007FFDEBB80000-0x00007FFDEBC4D000-memory.dmp

memory/2328-1468-0x00007FFDECEA0000-0x00007FFDECEB4000-memory.dmp

memory/2328-1467-0x00007FFDECEC0000-0x00007FFDECED2000-memory.dmp

memory/2328-1469-0x00007FFDECE70000-0x00007FFDECE92000-memory.dmp

memory/2328-1471-0x00007FFDEB960000-0x00007FFDEB977000-memory.dmp

memory/2328-1470-0x00007FFDF8330000-0x00007FFDF8357000-memory.dmp

memory/2328-1474-0x00007FFDEB8D0000-0x00007FFDEB8E1000-memory.dmp

memory/2328-1473-0x00007FFDEB8F0000-0x00007FFDEB93D000-memory.dmp

memory/2328-1472-0x00007FFDEB940000-0x00007FFDEB959000-memory.dmp

memory/2328-1476-0x00007FFDEB8B0000-0x00007FFDEB8CE000-memory.dmp

memory/2328-1475-0x00007FFDFB950000-0x00007FFDFB95F000-memory.dmp

memory/2328-1478-0x00007FFDEB810000-0x00007FFDEB848000-memory.dmp

memory/2328-1477-0x00007FFDEB850000-0x00007FFDEB8AD000-memory.dmp

memory/2328-1480-0x00007FFDEB7B0000-0x00007FFDEB7DE000-memory.dmp

memory/2328-1479-0x00007FFDEB7E0000-0x00007FFDEB809000-memory.dmp

memory/2328-1482-0x00007FFDEB600000-0x00007FFDEB77F000-memory.dmp

memory/2328-1481-0x00007FFDEB780000-0x00007FFDEB7A4000-memory.dmp

memory/2328-1483-0x00007FFDEB5E0000-0x00007FFDEB5F8000-memory.dmp

memory/2328-1492-0x00007FFDEB570000-0x00007FFDEB57C000-memory.dmp

memory/2328-1491-0x00007FFDEB960000-0x00007FFDEB977000-memory.dmp

memory/2328-1490-0x00007FFDEB580000-0x00007FFDEB58B000-memory.dmp

memory/2328-1489-0x00007FFDECE70000-0x00007FFDECE92000-memory.dmp

memory/2328-1488-0x00007FFDEB590000-0x00007FFDEB59C000-memory.dmp

memory/2328-1487-0x00007FFDEB5A0000-0x00007FFDEB5AB000-memory.dmp

memory/2328-1486-0x00007FFDEB5B0000-0x00007FFDEB5BC000-memory.dmp

memory/2328-1485-0x00007FFDEB5C0000-0x00007FFDEB5CB000-memory.dmp

memory/2328-1484-0x00007FFDEB5D0000-0x00007FFDEB5DB000-memory.dmp

memory/2328-1493-0x00007FFDEB8F0000-0x00007FFDEB93D000-memory.dmp

memory/2328-1503-0x00007FFDEB4C0000-0x00007FFDEB4CC000-memory.dmp

memory/2328-1502-0x00007FFDEB4D0000-0x00007FFDEB4E2000-memory.dmp

memory/2328-1500-0x00007FFDEB500000-0x00007FFDEB50C000-memory.dmp

memory/2328-1496-0x00007FFDEB540000-0x00007FFDEB54C000-memory.dmp

memory/2328-1499-0x00007FFDEB510000-0x00007FFDEB51C000-memory.dmp

memory/2328-1498-0x00007FFDEB520000-0x00007FFDEB52B000-memory.dmp

memory/2328-1497-0x00007FFDEB530000-0x00007FFDEB53B000-memory.dmp

memory/2328-1495-0x00007FFDEB550000-0x00007FFDEB55E000-memory.dmp

memory/2328-1494-0x00007FFDEB560000-0x00007FFDEB56C000-memory.dmp

memory/2328-1501-0x00007FFDEB4F0000-0x00007FFDEB4FD000-memory.dmp

memory/2328-1504-0x00007FFDEB480000-0x00007FFDEB4B6000-memory.dmp

memory/2328-1505-0x00007FFDEB850000-0x00007FFDEB8AD000-memory.dmp

memory/2328-1506-0x00007FFDEB810000-0x00007FFDEB848000-memory.dmp

memory/2328-1507-0x00007FFDEB1A0000-0x00007FFDEB480000-memory.dmp

memory/2328-1508-0x00007FFDEB780000-0x00007FFDEB7A4000-memory.dmp

memory/2328-1509-0x00007FFDE90A0000-0x00007FFDEB193000-memory.dmp

memory/2328-1510-0x00007FFDEB600000-0x00007FFDEB77F000-memory.dmp

memory/2328-1511-0x00007FFDE9080000-0x00007FFDE9097000-memory.dmp

memory/2328-1512-0x00007FFDE9050000-0x00007FFDE9071000-memory.dmp

memory/2328-1513-0x00007FFDE8CD0000-0x00007FFDE8CF2000-memory.dmp

memory/2328-1514-0x00007FFDE8C30000-0x00007FFDE8CC9000-memory.dmp

memory/2328-1516-0x00007FFDE8BC0000-0x00007FFDE8BF1000-memory.dmp

memory/2328-1515-0x00007FFDE8C00000-0x00007FFDE8C30000-memory.dmp

memory/2328-1522-0x00007FFDE8A10000-0x00007FFDE8AC2000-memory.dmp

memory/2328-1521-0x00007FFDE8AD0000-0x00007FFDE8AE4000-memory.dmp

memory/2328-1520-0x00007FFDE8AF0000-0x00007FFDE8B0C000-memory.dmp

memory/2328-1519-0x00007FFDE8B10000-0x00007FFDE8B29000-memory.dmp

memory/2328-1518-0x00007FFDE8B30000-0x00007FFDE8B4A000-memory.dmp

memory/2328-1517-0x00007FFDE8B70000-0x00007FFDE8BB1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_qwnk5rxl.ehw.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/2328-1547-0x00007FFDEC180000-0x00007FFDEC845000-memory.dmp

memory/2328-1556-0x00007FFDFB3B0000-0x00007FFDFB3E3000-memory.dmp

memory/2328-1553-0x00007FFDEBC50000-0x00007FFDEC179000-memory.dmp

memory/2328-1551-0x00007FFDFBCC0000-0x00007FFDFBCED000-memory.dmp

memory/2328-1585-0x00007FFDEB940000-0x00007FFDEB959000-memory.dmp

memory/2328-1587-0x00007FFDEB8D0000-0x00007FFDEB8E1000-memory.dmp

memory/2328-1586-0x00007FFDEB8F0000-0x00007FFDEB93D000-memory.dmp

memory/2328-1584-0x00007FFDEB960000-0x00007FFDEB977000-memory.dmp

memory/2328-1583-0x00007FFDECE70000-0x00007FFDECE92000-memory.dmp

memory/2328-1582-0x00007FFDECEA0000-0x00007FFDECEB4000-memory.dmp

memory/2328-1581-0x00007FFDECEC0000-0x00007FFDECED2000-memory.dmp

memory/2328-1580-0x00007FFDF2FC0000-0x00007FFDF2FD6000-memory.dmp

memory/2328-1579-0x00007FFDF8280000-0x00007FFDF828C000-memory.dmp

memory/2328-1578-0x00007FFDF3620000-0x00007FFDF3632000-memory.dmp

memory/2328-1574-0x00007FFDF82C0000-0x00007FFDF82CB000-memory.dmp

memory/2328-1573-0x00007FFDF82D0000-0x00007FFDF82DB000-memory.dmp

memory/2328-1572-0x00007FFDF82E0000-0x00007FFDF82EC000-memory.dmp

memory/2328-1571-0x00007FFDF82F0000-0x00007FFDF82FE000-memory.dmp

memory/2328-1570-0x00007FFDF8300000-0x00007FFDF830C000-memory.dmp

memory/2328-1569-0x00007FFDF8310000-0x00007FFDF831C000-memory.dmp

memory/2328-1568-0x00007FFDF8320000-0x00007FFDF832B000-memory.dmp

memory/2328-1567-0x00007FFDF8EB0000-0x00007FFDF8EBC000-memory.dmp

memory/2328-1565-0x00007FFDFAF70000-0x00007FFDFAF7C000-memory.dmp

memory/2328-1576-0x00007FFDF82A0000-0x00007FFDF82AC000-memory.dmp

memory/2328-1564-0x00007FFDFAF80000-0x00007FFDFAF8B000-memory.dmp

memory/2328-1563-0x00007FFDFB680000-0x00007FFDFB68B000-memory.dmp

memory/2328-1562-0x00007FFDFB950000-0x00007FFDFB95F000-memory.dmp

memory/2328-1561-0x00007FFDECEE0000-0x00007FFDECFFA000-memory.dmp

memory/2328-1560-0x00007FFDF8330000-0x00007FFDF8357000-memory.dmp

memory/2328-1559-0x00007FFDFBC00000-0x00007FFDFBC0B000-memory.dmp

memory/2328-1558-0x00007FFDFBC60000-0x00007FFDFBC6D000-memory.dmp