Malware Analysis Report

2025-05-05 21:08

Sample ID 241026-spxcgavhme
Target dist.exe
SHA256 893926efe19fd358908bff4c288ed54526e2e51ac565c02fdd8dcc1eeed2e7a6
Tags
pyinstaller pysilon upx evasion execution persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

893926efe19fd358908bff4c288ed54526e2e51ac565c02fdd8dcc1eeed2e7a6

Threat Level: Known bad

The file dist.exe was found to be: Known bad.

Malicious Activity Summary

pyinstaller pysilon upx evasion execution persistence

Pysilon family

Detect Pysilon

Enumerates VirtualBox DLL files

Sets file to hidden

Command and Scripting Interpreter: PowerShell

Executes dropped EXE

Loads dropped DLL

Adds Run key to start application

Legitimate hosting services abused for malware hosting/C2

UPX packed file

Detects Pyinstaller

Unsigned PE

Suspicious behavior: GetForegroundWindowSpam

Views/modifies file attributes

Suspicious use of WriteProcessMemory

Kills process with taskkill

Suspicious behavior: EnumeratesProcesses

Suspicious use of SetWindowsHookEx

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-10-26 15:18

Signatures

Detect Pysilon

Description Indicator Process Target
N/A N/A N/A N/A

Pysilon family

pysilon

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-10-26 15:18

Reported

2024-10-26 15:55

Platform

win7-20240903-en

Max time kernel

1558s

Max time network

1562s

Command Line

"C:\Users\Admin\AppData\Local\Temp\dist.exe"

Signatures

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2276 wrote to memory of 2164 N/A C:\Users\Admin\AppData\Local\Temp\dist.exe C:\Users\Admin\AppData\Local\Temp\dist.exe
PID 2276 wrote to memory of 2164 N/A C:\Users\Admin\AppData\Local\Temp\dist.exe C:\Users\Admin\AppData\Local\Temp\dist.exe
PID 2276 wrote to memory of 2164 N/A C:\Users\Admin\AppData\Local\Temp\dist.exe C:\Users\Admin\AppData\Local\Temp\dist.exe

Processes

C:\Users\Admin\AppData\Local\Temp\dist.exe

"C:\Users\Admin\AppData\Local\Temp\dist.exe"

C:\Users\Admin\AppData\Local\Temp\dist.exe

"C:\Users\Admin\AppData\Local\Temp\dist.exe"

Network

N/A

Files

C:\Users\Admin\AppData\Local\Temp\_MEI22762\ucrtbase.dll

MD5 3b337c2d41069b0a1e43e30f891c3813
SHA1 ebee2827b5cb153cbbb51c9718da1549fa80fc5c
SHA256 c04daeba7e7c4b711d33993ab4c51a2e087f98f4211aea0dcb3a216656ba0ab7
SHA512 fdb3012a71221447b35757ed2bdca6ed1f8833b2f81d03aabebd2cd7780a33a9c3d816535d03c5c3edd5aaf11d91156842b380e2a63135e3c7f87193ad211499

C:\Users\Admin\AppData\Local\Temp\_MEI22762\api-ms-win-core-localization-l1-2-0.dll

MD5 0414909b279ea61ca344edbe8e33e40b
SHA1 4ece0dabe954c43f9bd5032de76ec29c47b22e10
SHA256 05b0c773a77850f3d50ddb4b82cc4d5f19316fe1aaa65e21b4709ae73f60a28e
SHA512 edbd33540cd1ef69f2ce824cfb991903ec6e4edda815f07d610247594ceeb2ebc78f05a44b4de8c5c937191b7e8b2ef221423c06df303d73deea721c25d15eed

C:\Users\Admin\AppData\Local\Temp\_MEI22762\api-ms-win-core-processthreads-l1-1-1.dll

MD5 b1ba47d8389c40c2dda3c56cbed14fc5
SHA1 2eef9ffa32171d53affa44e3db7727aa383f7fac
SHA256 c7277c05dc6b905fad5cb930b0ecfbbc4676b46974b4571e54ca44cb6f6be404
SHA512 466e31f17f73bda5149343b23f4966502a8597d2a2e43f9a6c9c32387451d92c6b658ccaae27044e68e4a9fd0ef9c89e32dc7639d59fcf04c596b6abfa09658b

C:\Users\Admin\AppData\Local\Temp\_MEI22762\api-ms-win-core-file-l1-2-0.dll

MD5 3473bc217562594b5b126d7aeb9380e9
SHA1 b551b9d9aa80be070f577376e484610e01c5171a
SHA256 0d8190fd619feb20df123931108d499132f7051f1ebb0ef246082f4c52c88b22
SHA512 036b93457ade632ad68264d81ff26ee1156038e234c606882386d6babcbe722a18e9ced1655f97caecaf5fd514e261dafe999a3e9fec00cc677e177f0bf8e203

C:\Users\Admin\AppData\Local\Temp\_MEI22762\api-ms-win-core-timezone-l1-1-0.dll

MD5 953c63ef10ec30ef7c89a6f0f7074041
SHA1 4b4f1ff3085fded9dbd737f273585ad43175b0a3
SHA256 c93954167c12e15b58ac95240d2e0a2fbd94561d739d9f6aca906d9c30453496
SHA512 b4534785e4d02ad387e3c6082884d438cc4b3cd8758aabcf99620052f5842dbd298351bc1723c274d4f7d3fce0cc940df3d47865fece2f07cdb1151376ba852e

C:\Users\Admin\AppData\Local\Temp\_MEI22762\python312.dll

MD5 71070618402c15a2fad5ca70c9ef7297
SHA1 34fedbf17a57010c5cd20ef4e690616859cc8e68
SHA256 7d35a191edb95ccd85ef05d645deeca3ed1febd9acd659569fab56ae06c1ebdf
SHA512 81ef8749f5c3dbd586ddbbcf26cd6c80607a5cc9c26e31c912f454ca56013082174e2012a507739ec1e9c5a2f019bf0ca6bd3ce18880abdbff0ba5f8f3cbbf28

\Users\Admin\AppData\Local\Temp\_MEI22762\api-ms-win-core-file-l2-1-0.dll

MD5 50abf0a7ee67f00f247bada185a7661c
SHA1 0cddac9ac4db3bf10a11d4b79085ef9cb3fb84a1
SHA256 f957a4c261506484b53534a9be8931c02ec1a349b3f431a858f8215cecfec3f7
SHA512 c2694bb5d103baff1264926a04d2f0fe156b8815a23c3748412a81cc307b71a9236a0e974b5549321014065e393d10228a0f0004df9ba677f03b5d244a64b528

memory/2164-1322-0x000007FEF61C0000-0x000007FEF6885000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-10-26 15:18

Reported

2024-10-26 15:29

Platform

win10v2004-20241007-en

Max time kernel

137s

Max time network

139s

Command Line

"C:\Users\Admin\AppData\Local\Temp\dist.exe"

Signatures

Enumerates VirtualBox DLL files

Description Indicator Process Target
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\public\win.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\public\win.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\public\win.exe N/A
N/A N/A C:\Users\Admin\public\win.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Users\\Admin\\public\\win.exe" C:\Users\Admin\AppData\Local\Temp\dist.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\public\win.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\dist.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\public\win.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\public\win.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 436 wrote to memory of 3060 N/A C:\Users\Admin\AppData\Local\Temp\dist.exe C:\Users\Admin\AppData\Local\Temp\dist.exe
PID 436 wrote to memory of 3060 N/A C:\Users\Admin\AppData\Local\Temp\dist.exe C:\Users\Admin\AppData\Local\Temp\dist.exe
PID 3060 wrote to memory of 3768 N/A C:\Users\Admin\AppData\Local\Temp\dist.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3060 wrote to memory of 3768 N/A C:\Users\Admin\AppData\Local\Temp\dist.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3060 wrote to memory of 4804 N/A C:\Users\Admin\AppData\Local\Temp\dist.exe C:\Windows\system32\cmd.exe
PID 3060 wrote to memory of 4804 N/A C:\Users\Admin\AppData\Local\Temp\dist.exe C:\Windows\system32\cmd.exe
PID 4804 wrote to memory of 3376 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 4804 wrote to memory of 3376 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 4804 wrote to memory of 5032 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\public\win.exe
PID 4804 wrote to memory of 5032 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\public\win.exe
PID 4804 wrote to memory of 7148 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 4804 wrote to memory of 7148 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 5032 wrote to memory of 6376 N/A C:\Users\Admin\public\win.exe C:\Users\Admin\public\win.exe
PID 5032 wrote to memory of 6376 N/A C:\Users\Admin\public\win.exe C:\Users\Admin\public\win.exe
PID 6376 wrote to memory of 6480 N/A C:\Users\Admin\public\win.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 6376 wrote to memory of 6480 N/A C:\Users\Admin\public\win.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\dist.exe

"C:\Users\Admin\AppData\Local\Temp\dist.exe"

C:\Users\Admin\AppData\Local\Temp\dist.exe

"C:\Users\Admin\AppData\Local\Temp\dist.exe"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x384 0x4f4

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\public\""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\public\activate.bat

C:\Windows\system32\attrib.exe

attrib +s +h .

C:\Users\Admin\public\win.exe

"win.exe"

C:\Windows\system32\taskkill.exe

taskkill /f /im "dist.exe"

C:\Users\Admin\public\win.exe

"win.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\public\""

Network

Country Destination Domain Proto
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 77.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 26.35.223.20.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 discord.com udp
N/A 127.0.0.1:52740 tcp
US 162.159.128.233:443 discord.com tcp
US 8.8.8.8:53 gateway.discord.gg udp
US 162.159.136.234:443 gateway.discord.gg tcp
US 8.8.8.8:53 233.128.159.162.in-addr.arpa udp
US 8.8.8.8:53 234.136.159.162.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 171.39.242.20.in-addr.arpa udp
US 8.8.8.8:53 102.209.201.84.in-addr.arpa udp
US 8.8.8.8:53 79.190.18.2.in-addr.arpa udp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp
US 150.171.28.10:443 tse1.mm.bing.net tcp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI4362\ucrtbase.dll

MD5 3b337c2d41069b0a1e43e30f891c3813
SHA1 ebee2827b5cb153cbbb51c9718da1549fa80fc5c
SHA256 c04daeba7e7c4b711d33993ab4c51a2e087f98f4211aea0dcb3a216656ba0ab7
SHA512 fdb3012a71221447b35757ed2bdca6ed1f8833b2f81d03aabebd2cd7780a33a9c3d816535d03c5c3edd5aaf11d91156842b380e2a63135e3c7f87193ad211499

C:\Users\Admin\AppData\Local\Temp\_MEI4362\python312.dll

MD5 71070618402c15a2fad5ca70c9ef7297
SHA1 34fedbf17a57010c5cd20ef4e690616859cc8e68
SHA256 7d35a191edb95ccd85ef05d645deeca3ed1febd9acd659569fab56ae06c1ebdf
SHA512 81ef8749f5c3dbd586ddbbcf26cd6c80607a5cc9c26e31c912f454ca56013082174e2012a507739ec1e9c5a2f019bf0ca6bd3ce18880abdbff0ba5f8f3cbbf28

C:\Users\Admin\AppData\Local\Temp\_MEI4362\VCRUNTIME140.dll

MD5 be8dbe2dc77ebe7f88f910c61aec691a
SHA1 a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA256 4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA512 0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

memory/3060-1314-0x00007FFBE8520000-0x00007FFBE8BE5000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI4362\base_library.zip

MD5 21bf7b131747990a41b9f8759c119302
SHA1 70d4da24b4c5a12763864bf06ebd4295c16092d9
SHA256 f36454a982f5665d4e7fcc69ee81146965358fcb7f5d59f2cd8861ca89c66efa
SHA512 4cb45e9c48d4544c1a171d88581f857d8c5cf74e273bb2acf40a50a35c5148fe7d6e9afcf5e1046a7d7ae77f9196f7308ae3869c18d813fcd48021b4d112deb5

C:\Users\Admin\AppData\Local\Temp\_MEI4362\_ctypes.pyd

MD5 2c86195dc1f4c71e1f2b5e765b857134
SHA1 b6aac5a04a5cdee7760c51517a17146110fc034c
SHA256 aeda97261a50726546bef435bf27e042d425227e35b4e452c737afd8d74df755
SHA512 d4e85d0eaab94ecca94a2f143286d78b0a89fa50ecf880abcdcd04d84085fdaed874f87c25433cd8bb5340acf59b48da86ebc674142e42d4b904ccfb7ff78e6f

C:\Users\Admin\AppData\Local\Temp\_MEI4362\python3.DLL

MD5 5eace36402143b0205635818363d8e57
SHA1 ae7b03251a0bac083dec3b1802b5ca9c10132b4c
SHA256 25a39e721c26e53bec292395d093211bba70465280acfa2059fa52957ec975b2
SHA512 7cb3619ea46fbaaf45abfa3d6f29e7a5522777980e0a9d2da021d6c68bcc380abe38e8004e1f31d817371fb3cdd5425d4bb115cb2dc0d40d59d111a2d98b21d4

C:\Users\Admin\AppData\Local\Temp\_MEI4362\libffi-8.dll

MD5 08b000c3d990bc018fcb91a1e175e06e
SHA1 bd0ce09bb3414d11c91316113c2becfff0862d0d
SHA256 135c772b42ba6353757a4d076ce03dbf792456143b42d25a62066da46144fece
SHA512 8820d297aeda5a5ebe1306e7664f7a95421751db60d71dc20da251bcdfdc73f3fd0b22546bd62e62d7aa44dfe702e4032fe78802fb16ee6c2583d65abc891cbf

memory/3060-1324-0x00007FFBFE160000-0x00007FFBFE16F000-memory.dmp

memory/3060-1323-0x00007FFBF6C10000-0x00007FFBF6C35000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI4362\_bz2.pyd

MD5 02b3d81015e639b661618c41e04b4880
SHA1 ce3c380e6a950839bcdd09d77719c09ced70e56d
SHA256 ed1c62990501eaca4be730b968a304fefe4d17ee529b87f3626e256e297abcfe
SHA512 46408b646249e3b704f7984eb9f590650a6f88454339f9c012b7df1f9fda4096f290d7b3dc3e957ed896b6a29ef98f20d477519a89ccfbf993856617ffbcf99d

C:\Users\Admin\AppData\Local\Temp\_MEI4362\_lzma.pyd

MD5 152a1031c78a2e4d5f0c2077403fb604
SHA1 21f5aeb5e7504afde2701fe59b45027087fb5928
SHA256 10360bb7dc515e7282cb7f9be5427399117e76c3da8804cac35703e42bca8395
SHA512 3799d96cf634cab00d06454502ec68c017d8625346017cbf23a8cf38e63837b6e6608ecc044680557fb2c5060bb936d9c10080b2478c2601b4c33b5f31d2b6de

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-handle-l1-1-0.dll

MD5 53b1beee348ff035fef099922d69d588
SHA1 7bc23b19568e2683641116f770773f8bcf03376b
SHA256 3a52229bf8a9df9f69a450f1ed7afc0d813d478d148c20f88ec4169d19b0d592
SHA512 85c7ffa63483d69870cd69bf40e2b4ea5992d6b82607ee9bfc354c3bd5079e18cfe2ca0bcaa2fe493b42226f4a8097737116ea023823ce3ef177596dd80edcdb

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-file-l2-1-0.dll

MD5 50abf0a7ee67f00f247bada185a7661c
SHA1 0cddac9ac4db3bf10a11d4b79085ef9cb3fb84a1
SHA256 f957a4c261506484b53534a9be8931c02ec1a349b3f431a858f8215cecfec3f7
SHA512 c2694bb5d103baff1264926a04d2f0fe156b8815a23c3748412a81cc307b71a9236a0e974b5549321014065e393d10228a0f0004df9ba677f03b5d244a64b528

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-file-l1-2-0.dll

MD5 3473bc217562594b5b126d7aeb9380e9
SHA1 b551b9d9aa80be070f577376e484610e01c5171a
SHA256 0d8190fd619feb20df123931108d499132f7051f1ebb0ef246082f4c52c88b22
SHA512 036b93457ade632ad68264d81ff26ee1156038e234c606882386d6babcbe722a18e9ced1655f97caecaf5fd514e261dafe999a3e9fec00cc677e177f0bf8e203

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-file-l1-1-0.dll

MD5 ecee1b7da6539c233e8dec78bfc8e1f9
SHA1 052ba049f6d8cd5579e01c9e2f85414b15e6cbf8
SHA256 249d7cd1c87738f87458b95ace4ab8f87b0de99eeefb796f6b86cba889d49b2c
SHA512 ea21fe20336b8170b2a8cd13df217e9ee87aa1d2b0ba476bee2a97c3fce57648c9ab664b9ba895d5bbbcd119f2bb6633bedc85dafbd7bf6853aa48b168a927f4

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-fibers-l1-1-0.dll

MD5 73dd550364215163ea9edb537e6b3714
SHA1 c24fcadfee877d5402e2b4f8518c4f5f4a2ce4b4
SHA256 0235c78780eff0bd34fce01d1c366e5e5936ea361676cb9711a4cfff747d457a
SHA512 2406d9d44d3ed86a95248b25cf574e0c06533cd916048a2facd68f4db48e49e8e8ce1917091bcfb273d0acc210697ceb659930c896e51464c300ec06476d8cc2

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-errorhandling-l1-1-0.dll

MD5 a17ff429442d4e5298f0faf95950a77d
SHA1 522a365dad26bedc2bfe48164dc63c2c37c993c3
SHA256 8e9d1d206da69da744d77f730233344ebe7c2a392550511698a79ce2d9180b41
SHA512 7d4e31251c171b90a0c533718655c98d8737ff220bcc43f893ff42c57ab43d82e6bd13fa94def5bb4205caec68dc8178d6b2a25ad819689f25dad01be544d5ac

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-debug-l1-1-0.dll

MD5 c68a86c180ff1fcac90d1da9a08179c1
SHA1 c287951441c957931dc4ebbee4dc9426a4501554
SHA256 2c91c4861e88c92693a1b145ebe2f69ffb90797cd42061e2d84f3d7fc009a941
SHA512 857fbf9852596ef7263d8faf970128487413c859246f58b15cec32d11576894c47211a3bd9005f86c2a28fa6b67fba96831c4953c0fa24e2373a6daecb85e121

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-heap-l1-1-0.dll

MD5 5846d53ac41102bb6f7e1f78717fea7f
SHA1 72254f1b93f17c2c6921179c31cd19b1b4c5292d
SHA256 059dfa16c1bbe5ff3a4b5443ba5e7ad1d41e392a873b09cfef787020ca3e101f
SHA512 0c29c0f562f1cabd794d8bf7f5cef0b0213fcf52a71eb254e0122f88c6e03558cb2259caff6b46d3b055101ef5422318e48d6c7568cbf2423212b8ed4e8f0f7f

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-crt-convert-l1-1-0.dll

MD5 55e742035343af7b93caeeb71d322bed
SHA1 121134dfeca618ec3fae3fb640e541141d0c7b65
SHA256 2364fa428deba813b8a27b369acea8ed365aa5c9da776d57e146576920746f0e
SHA512 601474b8c9185cb734df191f4382590f1466c0a32773e17c73afa5c1446dc648253d44e4ebad6ce0d29288afb1d7794c09ff0d7cfe81a3adc3dc26b3da46103d

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-crt-utility-l1-1-0.dll

MD5 4653da8959b7fe33d32e61e472507d54
SHA1 6d071b52f40dc609f40989b3dd0fb53124607df8
SHA256 b7e186a946119791e42f17e623732e23f864f98b592c41d95b3da0532ea9d5f3
SHA512 81e17cf4b64ed5efba191d35b1877384544557c3001efa0321a755a35413740ae66e39e39f573d3184ef8c893c739a74d37f170fe540f81177a83b44bc18ba6d

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-crt-time-l1-1-0.dll

MD5 9bc895e2cc140e168fa55372fce8682b
SHA1 579d71e19331625dda84baa9d8b81dd3bafc9913
SHA256 287f80b2b330cc5f9fdf47de50b189993ce925b5e2b7a6da5cdaef9c7d5f36c1
SHA512 de0e5c6f9656106fcf2443d863d26c4b16bbb5b40e676199f9c459be02b4837a2d32bddda82543eb2e0bf14a27edea7f5d506914da8d63da77ed7ccd2204aa65

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-crt-string-l1-1-0.dll

MD5 2e657fe299572eacdac67f4b9f603857
SHA1 eb4fbc0147d4df5d4ef81953bc1265d505a19297
SHA256 ec3c2bff10b9469ac9c6ed109307731a1a4694fb54856ddd082a2ffd3cc34df2
SHA512 ee3899584ecece342accbd73d681358cfe8b4fd2ed07cf3034b14f3d04e3b03e5d6d041a0afcb0b2b2b5afac118032317b5eca00d11f7703d9d0dae0e3ac38f7

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-crt-stdio-l1-1-0.dll

MD5 4a3342bce6b58ef810e804f1c5915e40
SHA1 fe636cca0a57e92bb27e0f76075110981d3b3639
SHA256 2509179079a598b3e5dfd856d8e03e45de7379c628901dbd869ec4332ddb618c
SHA512 f0c626f88f016c17fa45ea62441dd862a9575666ec06734f61d8e153c5f46a016fe1d9271293a8e29afbd167f7a381e3ee04cb413736bc224ac31e0fe760341c

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-crt-runtime-l1-1-0.dll

MD5 dc8bfceec3d20100f29fd4798415dc00
SHA1 bd4764be2833f40c1cc54229c759f83d67ae5294
SHA256 4950d0a97cb18971355247feccfd6f8ea24e46bca30f54540c050e4631ec57a8
SHA512 cc7899ad716a81af46d73b1cb8ded51aee9619f2accc35859e351fb8ee4f965f5bcc9adbb7353ca7a3c8e39d36c09481f66519cb173da1d2578718c764fb6fae

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-crt-process-l1-1-0.dll

MD5 38d1c8d2aa2023d85aca69286d79fb78
SHA1 a97e806268dc4ee781ec2bfb654ed8bf91c2a83a
SHA256 381a09a63b5818a2499144adbd8c5f6bbcfce93d643e9920cc54485006fbcc48
SHA512 fc71441009ebe69dfbc04a791cb401306cb88f7bed5290cd899e234d290209917dc7fbd0d0d1a16ceb056858c77306b8ee5f3c17432f3594904b73b20162738e

C:\Users\Admin\AppData\Local\Temp\_MEI4362\libogg-0.dll

MD5 0d65168162287df89af79bb9be79f65b
SHA1 3e5af700b8c3e1a558105284ecd21b73b765a6dc
SHA256 2ec2322aec756b795c2e614dab467ef02c3d67d527ad117f905b3ab0968ccf24
SHA512 69af81fd2293c31f456b3c78588bb6a372fe4a449244d74bfe5bfaa3134a0709a685725fa05055cfd261c51a96df4b7ebd8b9e143f0e9312c374e54392f8a2c2

C:\Users\Admin\AppData\Local\Temp\_MEI4362\libopus-0.dll

MD5 3fb9d9e8daa2326aad43a5fc5ddab689
SHA1 55523c665414233863356d14452146a760747165
SHA256 fd8de9169ccf53c5968eec0c90e9ff3a66fb451a5bf063868f3e82007106b491
SHA512 f263ea6e0fab84a65fe3a9b6c0fe860919eee828c84b888a5aa52dea540434248d1e810a883a2aff273cd9f22c607db966dd8776e965be6d2cfe1b50a1af1f57

C:\Users\Admin\AppData\Local\Temp\_MEI4362\libmodplug-1.dll

MD5 2bb2e7fa60884113f23dcb4fd266c4a6
SHA1 36bbd1e8f7ee1747c7007a3c297d429500183d73
SHA256 9319bf867ed6007f3c61da139c2ab8b74a4cb68bf56265a101e79396941f6d3b
SHA512 1ddd4b9b9238c1744e0a1fe403f136a1def8df94814b405e7b01dd871b3f22a2afe819a26e08752142f127c3efe4ebae8bfd1bd63563d5eb98b4644426f576b2

C:\Users\Admin\AppData\Local\Temp\_MEI4362\libjpeg-9.dll

MD5 c22b781bb21bffbea478b76ad6ed1a28
SHA1 66cc6495ba5e531b0fe22731875250c720262db1
SHA256 1eed2385030348c84bbdb75d41d64891be910c27fab8d20fc9e85485fcb569dd
SHA512 9b42cad4a715680a27cd79f466fd2913649b80657ff042528cba2946631387ed9fb027014d215e1baf05839509ca5915d533b91aa958ae0525dea6e2a869b9e4

C:\Users\Admin\AppData\Local\Temp\_MEI4362\libcrypto-3.dll

MD5 ecf92d1e849c1a4b89ed9dac0c2d732d
SHA1 bd2dbf194e9c891f27ef5b4521318d3804f76425
SHA256 afc166f8f1906cd75b4de9f7c72e92e36e4282437a02fedadb5ec3145c33c3a1
SHA512 44e3d6b37a11b715efb77c28c1c4fca4c25ba7f663183bcef4ba52e9c5271715f43f7b22b6307c6d8788c1ea4e8b709060b0a711aeae249164ba7bfd1d571f89

C:\Users\Admin\AppData\Local\Temp\_MEI4362\freetype.dll

MD5 04a9825dc286549ee3fa29e2b06ca944
SHA1 5bed779bf591752bb7aa9428189ec7f3c1137461
SHA256 50249f68b4faf85e7cd8d1220b7626a86bc507af9ae400d08c8e365f9ab97cde
SHA512 0e937e4de6cbc9d40035b94c289c2798c77c44fc1dc7097201f9fab97c7ff9e56113c06c51693f09908283eda92945b36de67351f893d4e3162e67c078cff4ec

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-crt-private-l1-1-0.dll

MD5 cd9cc79e885497f4da7cce77551ea160
SHA1 160427067df3cdf6fde3277a2ce1c69d82cedc5f
SHA256 7da01dcebc45ba07374a2bf5d88d6746b91bbb3a299b75458889d4ba7f5c11ee
SHA512 0b109f990c74ebdc995ad1f3c40a20e4478141a6714e74d3a0085f636e67423809b835f144eace9a65d38278ef33e0d5d8fbd890cde98ca8c30990d8e5a19aef

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-crt-math-l1-1-0.dll

MD5 a12569b252b6761a6330d2ffb6c2983b
SHA1 cc6bdb88b252144af816976a181d2b3b961ce389
SHA256 ab0de0cf89f88b947e01a5ab630d71384ad69f903cef063ccb10de54d061ea2e
SHA512 ee9cb0e2c613374348a34e4a65c83da8d35e6e841f50eed726ff397c7bb6ec430ed200b3b1a541041a91ebe5ae0c96270ee7b891c8c173b340c82abd2cdf8750

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-crt-locale-l1-1-0.dll

MD5 78fc4a7e489f64ea5e0a745c12477fd8
SHA1 51ab73b5142ee2f742abdaedf427690613a19f4a
SHA256 c12c28e3391a8c8adcabe4632470de824118c56338f46fcd8b99257709f50604
SHA512 c9064ff0b39421b28720e65e70695a997995cbec80f1534d88b886bda1797a7316d9b61e458b894b528c7bce21c36f1d4acd916de96d0cdfde59107ea93cd5d7

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-crt-heap-l1-1-0.dll

MD5 481282554b34e19c77978dc7888434e6
SHA1 bd33f1189fc79ac57716f9d030ef0bdd30205115
SHA256 8895c5ab2152a7f25f0c44a3457867229046952106d422331a1c57ad7935b47e
SHA512 fbe98fda91618dd980709babd8e56b8c4c4ff370e6de23075f89303aafffd723dddfd270f388c573914385e957add756bfe2b1fcef5f9f86cb30e111177a52e9

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-crt-filesystem-l1-1-0.dll

MD5 1fd59e1dd71eb3bdadb313029710dc33
SHA1 82f5de117d9c55247da873ab8ad23f4e07841366
SHA256 953e4403094ec0c3e8c3a9ab38012cc36d86ac5fe3fff2d6b6c5f51f75737c46
SHA512 69608ff0127587b93db86c8cb27a932fa4b550c7d8d908f9fb8579ba2bccc6d43e7283363f7b46dd39a40a8c790a030028a78302703658fd5d68f5ee9452a5aa

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-crt-environment-l1-1-0.dll

MD5 4eeb879fceeae59927f98a1a199b59ca
SHA1 3bb833edf4c10b42b7b376b93644ccc7f9a4b0f8
SHA256 e1b95e27cad9da4f0bd8bf4c913f49b9b8da6d28303f2946b55da3bd7feb36a3
SHA512 6a43eb0c660395a60d17401e948bc4da010261197ea13b5c9e043e7ee93c30eb17efb9b6b138ecdd77ddc3d0caa98921b57bfc244f6cd554417a0fba5c9407b0

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-crt-conio-l1-1-0.dll

MD5 43760078912b411595bcded3b2eb063d
SHA1 bd00cd60fd094b87ab0cff30cd2afe0a78853f22
SHA256 0a9bcaa55326373200396bb1af46b3058f8f7af7be3289544dddbafdec420fea
SHA512 d779f67bbb6e9867bcef7667c28e0032c01f36b8ea418504e9683240a6c0d9640b24d1dc5fa78cc9dcc4515f7be0d314f27ebcebc047b2e0f71680905d87827b

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-util-l1-1-0.dll

MD5 85a8b925d50105db8250fa0878bb146e
SHA1 4b56d7eb81e0666e0cd047f9205584a97ce91a01
SHA256 f3324803591d2794bad583c71d5036976941631a5f0e6d67c71fc8ba29f30ba8
SHA512 cb074508052fafa8baa2e988e0f4241411a543e55a6a9fee915029c6aa87c93cce1f0b14fe0658361b6b4ab6880b31a950c215404c0d71d8a862d4e74ab3b797

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-timezone-l1-1-0.dll

MD5 953c63ef10ec30ef7c89a6f0f7074041
SHA1 4b4f1ff3085fded9dbd737f273585ad43175b0a3
SHA256 c93954167c12e15b58ac95240d2e0a2fbd94561d739d9f6aca906d9c30453496
SHA512 b4534785e4d02ad387e3c6082884d438cc4b3cd8758aabcf99620052f5842dbd298351bc1723c274d4f7d3fce0cc940df3d47865fece2f07cdb1151376ba852e

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-sysinfo-l1-1-0.dll

MD5 1f0ab051a3f210db40a8c5e813ba0428
SHA1 e2ec19439618df1d6f34ee7c76108e3ea90a8b14
SHA256 2d4cdda6d6aec0b1a84d84528380c5650683b8eed680f3cafd821ac7f422070c
SHA512 a8ba535580d6756ac30e725411980a8d17e9a8aa1229233bb7a9b15c55b18b61136772d5d75cce0edf21b0f300bbd4d2458a4c69762261e928ef3cb7d5a14bdd

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-synch-l1-2-0.dll

MD5 b865442fb6836a9b933a216109ff3d0f
SHA1 15011fcaea649ca016fa93996639f59c23b74106
SHA256 498194cfe8b1138385595a7db3863adf29a9663551d746fb64648ffd075186b3
SHA512 eeb9fa00a941c4b30320fbb9ecc2717e53d13cd12394500d795be742dbe25c5fdf8590e9fe7f3b210a9d9aa07c7392419823a6a947591e7a38707a87309a2b76

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-synch-l1-1-0.dll

MD5 2c4be18e4d56e056b3fb7c2afb032e9e
SHA1 9620c91a98175dddccc1f1af78393143249e9eb9
SHA256 56657da3db3877624f5dad3980df3235fe7e1038916627c0845b5001199d513f
SHA512 18cbb5671ed99b475c7f6ff2d41943ba6d28fbbd781884bf069d1aa83f051c00d61baa11459dcca4fe2a4bc26c3540e1f598e4e0ae59a5e18d340a68b695ed78

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-string-l1-1-0.dll

MD5 9ab1bde57b958090d53de161469e5e8d
SHA1 8452aed000b2e77040ba8b1e5762532cdf5a60ad
SHA256 199c988d566f19e8c67f4cd7147a7df591cd2f2d648cbc511a5e4580346e75f4
SHA512 cf53c6885e154a05f8773d6b66a605049d70cc544f22a11d423c885608cd387446306ce6dfee2cc4ee9387cdc0a50da55948b5e55ad94acde7c7fd04fe38a137

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-rtlsupport-l1-1-0.dll

MD5 c03daa9e875ff8638f631b1c95f4b342
SHA1 71eaeaccea8a302f87d1594ce612449c1195e882
SHA256 a281ae7a487ecea619e696903e5a8119ae3f9e9eb2f0b64b31a8324b530a4d35
SHA512 efa6ca2710f9827888f2cfcb87a321d66593b39988ebf743f37e2b8fe77dba9517bdd8571d0be7573cd6e1c786c1edba10857cfb6060e315aa0d46a16523d43b

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-profile-l1-1-0.dll

MD5 430d7cdd96bc499ba9eb84bb36aa301a
SHA1 48b43f6e4ffa8423966d06b417b82c5f72525dd9
SHA256 3e16b030a162ee3b4f6bf612af75d02a768a87f2d6a41a83f5adab2ec3c24dd1
SHA512 51042ebca24086e1d0015fa921816a2f3c56065e1e15190b48c58656eb88610d64acacb87584981963cab501985c2cb68e53075cf5e0c65761bbddaf56fbbab0

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-processthreads-l1-1-1.dll

MD5 b1ba47d8389c40c2dda3c56cbed14fc5
SHA1 2eef9ffa32171d53affa44e3db7727aa383f7fac
SHA256 c7277c05dc6b905fad5cb930b0ecfbbc4676b46974b4571e54ca44cb6f6be404
SHA512 466e31f17f73bda5149343b23f4966502a8597d2a2e43f9a6c9c32387451d92c6b658ccaae27044e68e4a9fd0ef9c89e32dc7639d59fcf04c596b6abfa09658b

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-processthreads-l1-1-0.dll

MD5 d21be88a58960edfe83ccbbdf5c4103d
SHA1 3cb0d010837b77102e77ca62e1033ef4eb5473ac
SHA256 3e909b4951e485de391f9a101e513b32c6d3507674c4d666ad3105b939b25c24
SHA512 99b1fda3ec9292a59ed528ab243b4f8ac63e2d7b219135f26050bb7dd124a5d5dc4a14a69383a8aa0b03f0f0a3bccf0c233ef09b8e3d3bdf43d0aa1cfc1a3992

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-processenvironment-l1-1-0.dll

MD5 df64597430e1126c3ba0fe5ecf995004
SHA1 3e32ad558501fb9d108f885a55841605be641628
SHA256 9638950211cbdcdaeb886cab277573391bf7dda2fbdb24fc18d31125dc8a7c24
SHA512 e16c1f5468bf2fc90b66b4b66dbad62cdbe29180f8da8ab8ad28d1b0c418cb96eadf24bb54f2ee9bcfe3176256d05f7eb591b6f908e47bd420ba22768fe0ea61

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-namedpipe-l1-1-0.dll

MD5 94fce2f4b244d3968b75a4a61b2347ab
SHA1 c5898af5fd941c19fcdd949c6b4e2bb090d040d2
SHA256 c513bdc265654d2e9a304423f299fb46953631f0d78af8c1d397cd58b491475a
SHA512 1afe1f3a9b803c5758ff24376fe040d856b5ca814717b490464260c9c78e70ce6c166efbcc98e26ac12dd6173285b4863da7df4ff644d1d8150f8ac4b47113e1

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-memory-l1-1-0.dll

MD5 5e93bf4aa81616285858ca455343b6d3
SHA1 8de55be56b6520801177f757d9e3235ec88085f7
SHA256 c44ec29a51145281372007d241a2cc15b00d0bacc8adfaac61e8e82efe8ea6a3
SHA512 e6a46dad1d7125dbaaf9d020100d7ec321620e38fdd1c931af74e8ec25e841c52555ec9646a895ad4450de94f70e82e9a237c2895ddfd16769b07cb73ad827e0

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-localization-l1-2-0.dll

MD5 0414909b279ea61ca344edbe8e33e40b
SHA1 4ece0dabe954c43f9bd5032de76ec29c47b22e10
SHA256 05b0c773a77850f3d50ddb4b82cc4d5f19316fe1aaa65e21b4709ae73f60a28e
SHA512 edbd33540cd1ef69f2ce824cfb991903ec6e4edda815f07d610247594ceeb2ebc78f05a44b4de8c5c937191b7e8b2ef221423c06df303d73deea721c25d15eed

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-libraryloader-l1-1-0.dll

MD5 5eb2d8e1b9c9bd462c808f492ef117c2
SHA1 60d398ec6e72ab670a2d9ef1b6747387c8de724e
SHA256 db85f9aae6e9a5f1664326fa3fb82fe1002a3053857724d6c8d979a07c1221a1
SHA512 df0ef770368f153104f828f1c2381bea9a79e69defd43af53bdd419b7d80144831e0c4cc8695baee9f26928f0c4a00fe4837c872313c37bce1b23e6690a93bda

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-interlocked-l1-1-0.dll

MD5 5a1569efa80fd139b561a9677a661f8a
SHA1 fb0c824688e65ed12f52fa961ef3bae5674f32af
SHA256 41c1eaf5545109e871abef7386ab1abf9d2de1762cb4720c945afa8424858b00
SHA512 1d2594c7f9757a95b41a9e6496f89c81fc96448b32cacb0c10d0db8c28a95cf33b3ad23348bcd8fb37d82bd72865d3c60944206f2e795686440de49bbcc39d7e

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-datetime-l1-1-0.dll

MD5 d7ad8db12ff42d620a657127dada1d88
SHA1 0ca381c734a3a93dc5f19c58dadfdca9d1afccd8
SHA256 26054d8febab1aacf11aa5cb64055808cd33388a8e77d0b3bcbc7543b0eea3bd
SHA512 7e2d6b60adbf97b22ab4b66691e483827d5755cfc6fcb5224369ada53cbd8cda43c4694a000ea4b5cebc69a475b54df0e9694c20afd9ec62b4db7b22241bdc45

C:\Users\Admin\AppData\Local\Temp\_MEI4362\api-ms-win-core-console-l1-1-0.dll

MD5 4a8f3a1847f216b8ac3e6b53bc20bd81
SHA1 f5aadc1399a9da38087df52e509d919d743e3ea7
SHA256 29b7d786d9f421765a4f4904f79605c41e17c0a24d7f91e44c0b7b0dea489fc3
SHA512 e70d2b719517c413fa967ca1a8d224299af55d988b3cc28013aaa3677660fae9ecb6f858d31c08cd8a0888f932af1384f0eaa928c002200f0710c2d5bddced1b

memory/3060-1330-0x00007FFBF5420000-0x00007FFBF544D000-memory.dmp

memory/3060-1329-0x00007FFBF8370000-0x00007FFBF838A000-memory.dmp

memory/3060-1377-0x00007FFBF8190000-0x00007FFBF81A4000-memory.dmp

memory/3060-1378-0x00007FFBE7FE0000-0x00007FFBE8513000-memory.dmp

memory/3060-1379-0x00007FFBF7FE0000-0x00007FFBF7FF9000-memory.dmp

memory/3060-1380-0x00007FFBFCEC0000-0x00007FFBFCECD000-memory.dmp

memory/3060-1381-0x00007FFBF53E0000-0x00007FFBF5413000-memory.dmp

memory/3060-1384-0x00007FFBFCBF0000-0x00007FFBFCBFD000-memory.dmp

memory/3060-1383-0x00007FFBE7F10000-0x00007FFBE7FDE000-memory.dmp

memory/3060-1382-0x00007FFBE8520000-0x00007FFBE8BE5000-memory.dmp

memory/3060-1386-0x00007FFBF4DF0000-0x00007FFBF4E17000-memory.dmp

memory/3060-1385-0x00007FFBFC9E0000-0x00007FFBFC9EB000-memory.dmp

memory/3060-1387-0x00007FFBE7AA0000-0x00007FFBE7BBA000-memory.dmp

memory/3060-1389-0x00007FFBF8900000-0x00007FFBF890F000-memory.dmp

memory/3060-1388-0x00007FFBF8190000-0x00007FFBF81A4000-memory.dmp

memory/3060-1406-0x00007FFBF4AB0000-0x00007FFBF4ABC000-memory.dmp

memory/3060-1407-0x00007FFBF4AA0000-0x00007FFBF4AAB000-memory.dmp

memory/3060-1405-0x00007FFBF4AD0000-0x00007FFBF4ADB000-memory.dmp

memory/3060-1404-0x00007FFBF53E0000-0x00007FFBF5413000-memory.dmp

memory/3060-1403-0x00007FFBF4AC0000-0x00007FFBF4ACB000-memory.dmp

memory/3060-1402-0x00007FFBE7F10000-0x00007FFBE7FDE000-memory.dmp

memory/3060-1401-0x00007FFBF53C0000-0x00007FFBF53CC000-memory.dmp

memory/3060-1400-0x00007FFBF53D0000-0x00007FFBF53DE000-memory.dmp

memory/3060-1399-0x00007FFBF7FE0000-0x00007FFBF7FF9000-memory.dmp

memory/3060-1398-0x00007FFBF7B40000-0x00007FFBF7B4B000-memory.dmp

memory/3060-1397-0x00007FFBF5980000-0x00007FFBF598D000-memory.dmp

memory/3060-1396-0x00007FFBF6C00000-0x00007FFBF6C0C000-memory.dmp

memory/3060-1395-0x00007FFBF6CA0000-0x00007FFBF6CAB000-memory.dmp

memory/3060-1394-0x00007FFBF7890000-0x00007FFBF789C000-memory.dmp

memory/3060-1393-0x00007FFBF78E0000-0x00007FFBF78EB000-memory.dmp

memory/3060-1392-0x00007FFBF78F0000-0x00007FFBF78FC000-memory.dmp

memory/3060-1391-0x00007FFBF84B0000-0x00007FFBF84BB000-memory.dmp

memory/3060-1390-0x00007FFBE7FE0000-0x00007FFBE8513000-memory.dmp

memory/3060-1413-0x00007FFBEFC40000-0x00007FFBEFC56000-memory.dmp

memory/3060-1414-0x00007FFBEA480000-0x00007FFBEA492000-memory.dmp

memory/3060-1412-0x00007FFBE7AA0000-0x00007FFBE7BBA000-memory.dmp

memory/3060-1415-0x00007FFBEA460000-0x00007FFBEA474000-memory.dmp

memory/3060-1416-0x00007FFBEA3F0000-0x00007FFBEA412000-memory.dmp

memory/3060-1419-0x00007FFBEA3D0000-0x00007FFBEA3EB000-memory.dmp

memory/3060-1418-0x00007FFBF4AC0000-0x00007FFBF4ACB000-memory.dmp

memory/3060-1417-0x00007FFBF53C0000-0x00007FFBF53CC000-memory.dmp

memory/3060-1411-0x00007FFBF4200000-0x00007FFBF420C000-memory.dmp

memory/3060-1410-0x00007FFBF4210000-0x00007FFBF4222000-memory.dmp

memory/3060-1409-0x00007FFBF4A90000-0x00007FFBF4A9D000-memory.dmp

memory/3060-1408-0x00007FFBF4DF0000-0x00007FFBF4E17000-memory.dmp

memory/3060-1420-0x00007FFBEA3B0000-0x00007FFBEA3C5000-memory.dmp

memory/3060-1421-0x00007FFBEA090000-0x00007FFBEA0A9000-memory.dmp

memory/3060-1423-0x00007FFBE7770000-0x00007FFBE77BD000-memory.dmp

memory/3060-1424-0x00007FFBE7750000-0x00007FFBE7761000-memory.dmp

memory/3060-1422-0x00007FFBF4AA0000-0x00007FFBF4AAB000-memory.dmp

memory/3060-1425-0x00007FFBE7730000-0x00007FFBE774E000-memory.dmp

memory/3060-1426-0x00007FFBE76D0000-0x00007FFBE772D000-memory.dmp

memory/3060-1427-0x00007FFBE7690000-0x00007FFBE76C8000-memory.dmp

memory/3060-1428-0x00007FFBE7660000-0x00007FFBE768A000-memory.dmp

memory/3060-1430-0x00007FFBE7630000-0x00007FFBE765F000-memory.dmp

memory/3060-1429-0x00007FFBEA3F0000-0x00007FFBEA412000-memory.dmp

memory/3060-1431-0x00007FFBE7600000-0x00007FFBE7624000-memory.dmp

memory/3060-1433-0x00007FFBE7480000-0x00007FFBE75FF000-memory.dmp

memory/3060-1432-0x00007FFBEA3B0000-0x00007FFBEA3C5000-memory.dmp

memory/3060-1434-0x00007FFBE7460000-0x00007FFBE7478000-memory.dmp

memory/3060-1443-0x00007FFBE73F0000-0x00007FFBE73FC000-memory.dmp

memory/3060-1454-0x00007FFBE7370000-0x00007FFBE737D000-memory.dmp

memory/3060-1459-0x00007FFBE7480000-0x00007FFBE75FF000-memory.dmp

memory/3060-1458-0x00007FFBE7600000-0x00007FFBE7624000-memory.dmp

memory/3060-1457-0x00007FFBE7340000-0x00007FFBE734C000-memory.dmp

memory/3060-1460-0x00007FFBE7300000-0x00007FFBE7336000-memory.dmp

memory/3060-1456-0x00007FFBE7350000-0x00007FFBE7362000-memory.dmp

memory/3060-1455-0x00007FFBE7630000-0x00007FFBE765F000-memory.dmp

memory/3060-1436-0x00007FFBE7450000-0x00007FFBE745B000-memory.dmp

memory/3060-1453-0x00007FFBE7660000-0x00007FFBE768A000-memory.dmp

memory/3060-1452-0x00007FFBE7380000-0x00007FFBE738B000-memory.dmp

memory/3060-1451-0x00007FFBE7390000-0x00007FFBE739C000-memory.dmp

memory/3060-1450-0x00007FFBE73A0000-0x00007FFBE73AB000-memory.dmp

memory/3060-1449-0x00007FFBE73B0000-0x00007FFBE73BB000-memory.dmp

memory/3060-1448-0x00007FFBE73C0000-0x00007FFBE73CC000-memory.dmp

memory/3060-1447-0x00007FFBE73D0000-0x00007FFBE73DE000-memory.dmp

memory/3060-1446-0x00007FFBE73E0000-0x00007FFBE73ED000-memory.dmp

memory/3060-1445-0x00007FFBE7690000-0x00007FFBE76C8000-memory.dmp

memory/3060-1444-0x00007FFBE76D0000-0x00007FFBE772D000-memory.dmp

memory/3060-1442-0x00007FFBE7730000-0x00007FFBE774E000-memory.dmp

memory/3060-1441-0x00007FFBE7400000-0x00007FFBE740B000-memory.dmp

memory/3060-1440-0x00007FFBE7410000-0x00007FFBE741C000-memory.dmp

memory/3060-1439-0x00007FFBE7420000-0x00007FFBE742B000-memory.dmp

memory/3060-1438-0x00007FFBE7430000-0x00007FFBE743C000-memory.dmp

memory/3060-1437-0x00007FFBE7440000-0x00007FFBE744B000-memory.dmp

memory/3060-1435-0x00007FFBE7770000-0x00007FFBE77BD000-memory.dmp

memory/3060-1461-0x00007FFBE70B0000-0x00007FFBE72FA000-memory.dmp

memory/3060-1462-0x00007FFBE6920000-0x00007FFBE70AA000-memory.dmp

memory/3060-1463-0x00007FFBE68C0000-0x00007FFBE6915000-memory.dmp

memory/3060-1464-0x00007FFBE65B0000-0x00007FFBE6890000-memory.dmp

memory/3060-1465-0x00007FFBE44B0000-0x00007FFBE65A3000-memory.dmp

memory/3060-1467-0x00007FFBE41F0000-0x00007FFBE4211000-memory.dmp

memory/3060-1466-0x00007FFBE4220000-0x00007FFBE4237000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_vrjqfrga.xjj.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/3060-1508-0x00007FFBE7FE0000-0x00007FFBE8513000-memory.dmp

memory/3060-1512-0x00007FFBE7F10000-0x00007FFBE7FDE000-memory.dmp

memory/3060-1542-0x00007FFBE7770000-0x00007FFBE77BD000-memory.dmp

memory/3060-1541-0x00007FFBEA090000-0x00007FFBEA0A9000-memory.dmp

memory/3060-1540-0x00007FFBEA3B0000-0x00007FFBEA3C5000-memory.dmp

memory/3060-1539-0x00007FFBEA3D0000-0x00007FFBEA3EB000-memory.dmp

memory/3060-1538-0x00007FFBEA3F0000-0x00007FFBEA412000-memory.dmp

memory/3060-1537-0x00007FFBEA460000-0x00007FFBEA474000-memory.dmp

memory/3060-1536-0x00007FFBEA480000-0x00007FFBEA492000-memory.dmp

memory/3060-1535-0x00007FFBEFC40000-0x00007FFBEFC56000-memory.dmp

memory/3060-1534-0x00007FFBF4200000-0x00007FFBF420C000-memory.dmp

memory/3060-1533-0x00007FFBF4210000-0x00007FFBF4222000-memory.dmp

memory/3060-1532-0x00007FFBF4A90000-0x00007FFBF4A9D000-memory.dmp

memory/3060-1531-0x00007FFBF4AA0000-0x00007FFBF4AAB000-memory.dmp

memory/3060-1529-0x00007FFBF4AC0000-0x00007FFBF4ACB000-memory.dmp

memory/3060-1528-0x00007FFBF4AD0000-0x00007FFBF4ADB000-memory.dmp

memory/3060-1527-0x00007FFBF53C0000-0x00007FFBF53CC000-memory.dmp

memory/3060-1526-0x00007FFBF53D0000-0x00007FFBF53DE000-memory.dmp

memory/3060-1525-0x00007FFBF5980000-0x00007FFBF598D000-memory.dmp

memory/3060-1524-0x00007FFBF6C00000-0x00007FFBF6C0C000-memory.dmp

memory/3060-1523-0x00007FFBF6CA0000-0x00007FFBF6CAB000-memory.dmp

memory/3060-1522-0x00007FFBF7890000-0x00007FFBF789C000-memory.dmp

memory/3060-1521-0x00007FFBF78E0000-0x00007FFBF78EB000-memory.dmp

memory/3060-1520-0x00007FFBF78F0000-0x00007FFBF78FC000-memory.dmp

memory/3060-1518-0x00007FFBF84B0000-0x00007FFBF84BB000-memory.dmp

memory/3060-1517-0x00007FFBF8900000-0x00007FFBF890F000-memory.dmp

memory/3060-1516-0x00007FFBE7AA0000-0x00007FFBE7BBA000-memory.dmp

memory/3060-1515-0x00007FFBF4DF0000-0x00007FFBF4E17000-memory.dmp

memory/3060-1514-0x00007FFBFC9E0000-0x00007FFBFC9EB000-memory.dmp

memory/3060-1543-0x00007FFBE7750000-0x00007FFBE7761000-memory.dmp

memory/3060-1511-0x00007FFBF53E0000-0x00007FFBF5413000-memory.dmp

memory/3060-1510-0x00007FFBFCEC0000-0x00007FFBFCECD000-memory.dmp

memory/3060-1509-0x00007FFBF7FE0000-0x00007FFBF7FF9000-memory.dmp

memory/3060-1502-0x00007FFBE8520000-0x00007FFBE8BE5000-memory.dmp

memory/3060-1507-0x00007FFBF8190000-0x00007FFBF81A4000-memory.dmp

memory/3060-1506-0x00007FFBF5420000-0x00007FFBF544D000-memory.dmp

memory/3060-1505-0x00007FFBF8370000-0x00007FFBF838A000-memory.dmp

memory/3060-1504-0x00007FFBFE160000-0x00007FFBFE16F000-memory.dmp

memory/3060-1503-0x00007FFBF6C10000-0x00007FFBF6C35000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI50322\attrs-24.2.0.dist-info\INSTALLER

MD5 365c9bfeb7d89244f2ce01c1de44cb85
SHA1 d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256 ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512 d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

memory/6376-4008-0x00007FFBFCEC0000-0x00007FFBFCECD000-memory.dmp

memory/6376-4019-0x00007FFBF6CA0000-0x00007FFBF6CAC000-memory.dmp

memory/6376-4018-0x00007FFBF7890000-0x00007FFBF789B000-memory.dmp

memory/6376-4017-0x00007FFBF78E0000-0x00007FFBF78EC000-memory.dmp

memory/6376-4016-0x00007FFBF78F0000-0x00007FFBF78FB000-memory.dmp

memory/6376-4015-0x00007FFBF7B40000-0x00007FFBF7B4C000-memory.dmp

memory/6376-4014-0x00007FFBF84B0000-0x00007FFBF84BB000-memory.dmp

memory/6376-4013-0x00007FFBF86F0000-0x00007FFBF86FB000-memory.dmp

memory/6376-4012-0x00007FFBFC9E0000-0x00007FFBFC9EF000-memory.dmp

memory/6376-4010-0x00007FFBF4DF0000-0x00007FFBF4E17000-memory.dmp

memory/6376-4009-0x00007FFBFCBF0000-0x00007FFBFCBFB000-memory.dmp

memory/6376-4007-0x00007FFBE9AF0000-0x00007FFBE9BBE000-memory.dmp

memory/6376-4006-0x00007FFBF53C0000-0x00007FFBF53F3000-memory.dmp

memory/6376-4005-0x00007FFBFE160000-0x00007FFBFE16D000-memory.dmp

memory/6376-4003-0x00007FFBE7FE0000-0x00007FFBE8513000-memory.dmp

memory/6376-4002-0x00007FFBF7FE0000-0x00007FFBF7FF4000-memory.dmp

memory/6376-3997-0x00007FFBE8520000-0x00007FFBE8BE5000-memory.dmp

memory/6376-4004-0x00007FFBF79C0000-0x00007FFBF79D9000-memory.dmp

memory/6376-4001-0x00007FFBF6C10000-0x00007FFBF6C3D000-memory.dmp

memory/6376-4000-0x00007FFBF8190000-0x00007FFBF81AA000-memory.dmp

memory/6376-3999-0x00007FFBFE9E0000-0x00007FFBFE9EF000-memory.dmp

memory/6376-3998-0x00007FFBF79E0000-0x00007FFBF7A05000-memory.dmp