Malware Analysis Report

2025-06-15 20:18

Sample ID 241216-stqeqavkcj
Target source_prepared.exe
SHA256 edc2d51c0c4fc3066017def71df3182e86e4a9479c79fc13d46a359393223e1b
Tags
pyinstaller pysilon upx evasion execution persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

edc2d51c0c4fc3066017def71df3182e86e4a9479c79fc13d46a359393223e1b

Threat Level: Known bad

The file source_prepared.exe was found to be: Known bad.

Malicious Activity Summary

pyinstaller pysilon upx evasion execution persistence

Detect Pysilon

Pysilon family

Enumerates VirtualBox DLL files

Sets file to hidden

Command and Scripting Interpreter: PowerShell

Loads dropped DLL

Executes dropped EXE

Legitimate hosting services abused for malware hosting/C2

Adds Run key to start application

UPX packed file

Unsigned PE

Detects Pyinstaller

Views/modifies file attributes

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Kills process with taskkill

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: GetForegroundWindowSpam

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-16 15:25

Signatures

Detect Pysilon

Description Indicator Process Target
N/A N/A N/A N/A

Pysilon family

pysilon

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-16 15:25

Reported

2024-12-16 15:28

Platform

win7-20241010-en

Max time kernel

118s

Max time network

121s

Command Line

"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\source_prepared.exe

"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"

C:\Users\Admin\AppData\Local\Temp\source_prepared.exe

"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"

Network

N/A

Files

C:\Users\Admin\AppData\Local\Temp\_MEI28882\ucrtbase.dll

MD5 5dd82151d2d8e2c0f1fba4ffb493baed
SHA1 12e24daa8902eb0c46cd8497666633f7ce9a8b58
SHA256 ee847c9d37eb901945ddccc2de73f657e3e92b148ae863b63e7f97d05ed558cb
SHA512 d00ba48b4614d2822e26c3bbdfaa171792dfab52bb50f16e66bdbb53efcef3d9b0e2d35816a40c787a63f5fdd8cc494ec5172c001f25e0ae42645cef330ddf5b

C:\Users\Admin\AppData\Local\Temp\_MEI28882\api-ms-win-core-sysinfo-l1-2-0.dll

MD5 7284671ec86b78c730efb85947c11122
SHA1 3fbf601e0443521081356c20a6d6f3f4e6338a28
SHA256 d77af2a15be5a51cd242c142d755fcafad76af9b57e472179f8c23f0790f106d
SHA512 a29177ded3a23d7bc04f1aa903ff0a63cc9a661335b02e5b913c780bbd4a072ec5b7ca5891fd3a53e9b1b6d3b5ede4b68224da5657c35485137d22ccf8ca7d8a

\Users\Admin\AppData\Local\Temp\_MEI28882\api-ms-win-core-kernel32-legacy-l1-1-1.dll

MD5 1190c9c96d3d54b0062b2aa07c345e07
SHA1 9da3cb7923d46eab3704e0521700bd645a27d860
SHA256 cd694dd9de1e8f62ddf41952550310c10264f677c153371b3cc3ff8f68280019
SHA512 e2284e713ea1f78bd4ebb08c6eb279ee3b85b404b96bc75fcb2a23d862815e37773edb31d7eb625f688f9d412d16d3388029e3dc53262b29dd5a6fa8c0bd83d9

C:\Users\Admin\AppData\Local\Temp\_MEI28882\api-ms-win-core-file-l1-2-0.dll

MD5 85496fce62c235a881dbe880c2b675a0
SHA1 8358f22d29ce31b9f9a8ec5ad440eb1a55f01433
SHA256 8ae99e14f909b91faa3163fc0f9c2a904de1ee5ebba342d708f747276c9d7ca8
SHA512 d0df9266b21e41a64a096ed0b567a0916d352c7fc9aa7c7ffe819c21a4e3552e79badb88c4829d2580643f86a58e191ad853de1d0e282f16f84a44a741782cc9

\Users\Admin\AppData\Local\Temp\_MEI28882\api-ms-win-core-fibers-l1-1-1.dll

MD5 46173f3aaeb1830adb3f6cb19bc9fe13
SHA1 5bacc120a80d0ef4722d1489c0563b95f99d1a99
SHA256 affc96d5aa19b374be7a56a859980b56858e22f2a221da8513eec42ffd21a718
SHA512 15f24097564fc57c0f05b1f08043b2789b18a638452018078d262038c407a8ce16658a208c58356ba81146c7a312c054d5b7e9c8d69d19b2cb833500e90c1648

\Users\Admin\AppData\Local\Temp\_MEI28882\api-ms-win-core-localization-l1-2-0.dll

MD5 24739ebbf1e51b4106518b09f0d26b38
SHA1 b90e291f502afa76922e01c1eddf0f95626957f6
SHA256 7ac6b6ad7094b606bfb194230ca16b6436bcecd4669a1cfcfd880e25ef3bd106
SHA512 6da9d0aaec46e9f9dd5b0cf865075e88390500bdb7aa04f17c961ff8db8a3f1238812b31aed451583c2e1431f3e447418e745cdbc82beccfb8a004522c1b1d3d

\Users\Admin\AppData\Local\Temp\_MEI28882\api-ms-win-core-timezone-l1-1-0.dll

MD5 0f6e970dea277438d33eed6a6a61709f
SHA1 34619c9343296107c404dbb11de00affe97185f9
SHA256 c88c3678a4e1bee3f12b2ce947f3bc37ed3d3231a5801ea822cc2c28fa87b078
SHA512 5122e116cb430382419fb205154b96d6e02812230b29d25c6e55f01ff889bcaa1fca9d4eebb04733ec19fb0f8f2785898b5cfe5e2204acd8e7e9884df1b9de1b

\Users\Admin\AppData\Local\Temp\_MEI28882\api-ms-win-core-processthreads-l1-1-1.dll

MD5 605d8a1ae34b7ee0b92fb5fbdfaacd8b
SHA1 6f62d615fa91c9707ab03995a690c41cb1a7f34d
SHA256 2aaa351f7d1e423ecfd6db6550b1f7d6ef8c76afe238e8491aa7e4827615edd2
SHA512 ee7ddd2bae12e32ad78625f1a2e7efbd83962cbf1251ee429b3ee3e85170f29fec474489cee57089fe23b60fd5097b44980abaaf4ec542df757e6cad8a55c708

C:\Users\Admin\AppData\Local\Temp\_MEI28882\python312.dll

MD5 f23aa992b8e0a301ec8f473d6b784f4b
SHA1 ee73a5da238341cb21a781a3ddcb187d1f971680
SHA256 0ddfba7779ebc44f2fa819a78b54bc730a5543274986e973beee024fab0ecfc6
SHA512 028abb66298fee6173d34f80940f5bdd3988a8373234f32a780ae93e155d90af191d85164077d9b76dc3651bda4d9902ccbfd03d37be3e9662006b65c3defb35

\Users\Admin\AppData\Local\Temp\_MEI28882\api-ms-win-core-file-l2-1-0.dll

MD5 dbc82f123f6888c0efd2aa7bee02707b
SHA1 76c95b72a671830e8590e104448f92180c10006a
SHA256 a5993dc5b4fbc0b2463537666bd0f19b3e9824fc4933490278091877bfd707f0
SHA512 547bb55c8337816494597ec796f75838594d3abd6ac24fe5692b28ef9a5af338dfeba17875854b89a21381bfaf41613e072fb632272547762283cae6474fd8c7

memory/3052-1331-0x000007FEF6150000-0x000007FEF6820000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-12-16 15:25

Reported

2024-12-16 15:28

Platform

win10v2004-20241007-en

Max time kernel

148s

Max time network

152s

Command Line

"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"

Signatures

Enumerates VirtualBox DLL files

Description Indicator Process Target
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
File opened (read-only) C:\windows\system32\vboxhook.dll C:\Users\Admin\pysilon\pysilon.exe N/A
File opened (read-only) C:\windows\system32\vboxmrxnp.dll C:\Users\Admin\pysilon\pysilon.exe N/A

Command and Scripting Interpreter: PowerShell

execution
Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Sets file to hidden

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Admin\pysilon\pysilon.exe N/A
N/A N/A C:\Users\Admin\pysilon\pysilon.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Pysilon = "C:\\Users\\Admin\\pysilon\\pysilon.exe" C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\pysilon\pysilon.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\pysilon\pysilon.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\pysilon\pysilon.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3108 wrote to memory of 3988 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Users\Admin\AppData\Local\Temp\source_prepared.exe
PID 3108 wrote to memory of 3988 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Users\Admin\AppData\Local\Temp\source_prepared.exe
PID 3988 wrote to memory of 4588 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3988 wrote to memory of 4588 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3988 wrote to memory of 4436 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Windows\system32\cmd.exe
PID 3988 wrote to memory of 4436 N/A C:\Users\Admin\AppData\Local\Temp\source_prepared.exe C:\Windows\system32\cmd.exe
PID 4436 wrote to memory of 980 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 4436 wrote to memory of 980 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\attrib.exe
PID 4436 wrote to memory of 920 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\pysilon\pysilon.exe
PID 4436 wrote to memory of 920 N/A C:\Windows\system32\cmd.exe C:\Users\Admin\pysilon\pysilon.exe
PID 4436 wrote to memory of 3400 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 4436 wrote to memory of 3400 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 920 wrote to memory of 4736 N/A C:\Users\Admin\pysilon\pysilon.exe C:\Users\Admin\pysilon\pysilon.exe
PID 920 wrote to memory of 4736 N/A C:\Users\Admin\pysilon\pysilon.exe C:\Users\Admin\pysilon\pysilon.exe
PID 4736 wrote to memory of 2688 N/A C:\Users\Admin\pysilon\pysilon.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 4736 wrote to memory of 2688 N/A C:\Users\Admin\pysilon\pysilon.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

Views/modifies file attributes

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\attrib.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\source_prepared.exe

"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"

C:\Users\Admin\AppData\Local\Temp\source_prepared.exe

"C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"

C:\Windows\system32\AUDIODG.EXE

C:\Windows\system32\AUDIODG.EXE 0x4fc 0x514

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\pysilon\""

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c C:\Users\Admin\pysilon\activate.bat

C:\Windows\system32\attrib.exe

attrib +s +h .

C:\Users\Admin\pysilon\pysilon.exe

"pysilon.exe"

C:\Windows\system32\taskkill.exe

taskkill /f /im "source_prepared.exe"

C:\Users\Admin\pysilon\pysilon.exe

"pysilon.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "Add-MpPreference -ExclusionPath \"C:\Users\Admin\pysilon\""

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
N/A 127.0.0.1:50299 tcp
US 8.8.8.8:53 discord.com udp
US 162.159.138.232:443 discord.com tcp
US 8.8.8.8:53 232.138.159.162.in-addr.arpa udp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 206.23.85.13.in-addr.arpa udp
US 8.8.8.8:53 22.49.80.91.in-addr.arpa udp
US 8.8.8.8:53 83.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 11.227.111.52.in-addr.arpa udp
US 8.8.8.8:53 21.49.80.91.in-addr.arpa udp
US 8.8.8.8:53 28.173.189.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI31082\ucrtbase.dll

MD5 5dd82151d2d8e2c0f1fba4ffb493baed
SHA1 12e24daa8902eb0c46cd8497666633f7ce9a8b58
SHA256 ee847c9d37eb901945ddccc2de73f657e3e92b148ae863b63e7f97d05ed558cb
SHA512 d00ba48b4614d2822e26c3bbdfaa171792dfab52bb50f16e66bdbb53efcef3d9b0e2d35816a40c787a63f5fdd8cc494ec5172c001f25e0ae42645cef330ddf5b

C:\Users\Admin\AppData\Local\Temp\_MEI31082\python312.dll

MD5 f23aa992b8e0a301ec8f473d6b784f4b
SHA1 ee73a5da238341cb21a781a3ddcb187d1f971680
SHA256 0ddfba7779ebc44f2fa819a78b54bc730a5543274986e973beee024fab0ecfc6
SHA512 028abb66298fee6173d34f80940f5bdd3988a8373234f32a780ae93e155d90af191d85164077d9b76dc3651bda4d9902ccbfd03d37be3e9662006b65c3defb35

C:\Users\Admin\AppData\Local\Temp\_MEI31082\VCRUNTIME140.dll

MD5 4585a96cc4eef6aafd5e27ea09147dc6
SHA1 489cfff1b19abbec98fda26ac8958005e88dd0cb
SHA256 a8f950b4357ec12cfccddc9094cca56a3d5244b95e09ea6e9a746489f2d58736
SHA512 d78260c66331fe3029d2cc1b41a5d002ec651f2e3bbf55076d65839b5e3c6297955afd4d9ab8951fbdc9f929dbc65eb18b14b59bce1f2994318564eb4920f286

memory/3988-1317-0x00007FFECE800000-0x00007FFECEED0000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI31082\base_library.zip

MD5 898e35281a756640780dbc31a0b78452
SHA1 845b59cfd9fb152725f250a872e9d1d7a66af258
SHA256 0daa440c78582a693dabbc2325a06d817131bb170bad436b126bad896f1377cd
SHA512 421cc4a15e94293e53f1039b8bb5be7edcbc8e3e0e4abc7f34faf991993f51cb5f51493b58bb341cb9579347ec134b02104454075a8e7e33e45b8e3a66a44d79

C:\Users\Admin\AppData\Local\Temp\_MEI31082\_lzma.pyd

MD5 b5527d2f85ff0ef7c781447601c55e8e
SHA1 3c1f96424de9c6075d3dde9c2700027fe6dadb66
SHA256 67f56b6b023600b2ef2dac5b37c75d8df7197f3db714621055a2e37422316e27
SHA512 2ecaa3feda6669e541a9704c380bfa99580e2790795cacd626b3c99e906e698b42c62e7ee69bc48d1f4d3131a91901615b601523d0d95b2d9ba7ec6659a10a62

memory/3988-1333-0x00007FFEDE130000-0x00007FFEDE15D000-memory.dmp

memory/3988-1332-0x00007FFEDE160000-0x00007FFEDE179000-memory.dmp

memory/3988-1331-0x00007FFEE7CF0000-0x00007FFEE7CFF000-memory.dmp

memory/3988-1330-0x00007FFEDE180000-0x00007FFEDE1A5000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI31082\_bz2.pyd

MD5 74bc4cb52e6b10983fdc2d40d611d8a4
SHA1 fc181a1167d77759781dc086e374f90c78930b7b
SHA256 57e4e02f82eeed869625e9e5e4f2d51f4f4819b24e04c8cee840d82133f2161a
SHA512 378c3fb1f8556cf2a3a0a5df5811903c1626a36fb5f6b52f719e3aa2e066fe1b7db83883f13bd57d5ff81a409919b9fafea0c1acb0980841bd62997a6b25b259

C:\Users\Admin\AppData\Local\Temp\_MEI31082\libffi-8.dll

MD5 013a0b2653aa0eb6075419217a1ed6bd
SHA1 1b58ff8e160b29a43397499801cf8ab0344371e7
SHA256 e9d8eb01bb9b02ce3859ba4527938a71b4668f98897d46f29e94b27014036523
SHA512 0bd13fa1d55133ee2a96387e0756f48133987bacd99d1f58bab3be7bffdf868092060c17ab792dcfbb4680f984f40d3f7cc24abdd657b756496aa8884b8f6099

C:\Users\Admin\AppData\Local\Temp\_MEI31082\_ctypes.pyd

MD5 6e02d07340dfaea121a64bef762e0d67
SHA1 48b107a7391772ed849fd1f13a7d2eca9fc09593
SHA256 7035c88e2a0099785ef34f89275de92b34ef3299f01c816d844832c55701c3e3
SHA512 8790af18a4ac4a23f67c8c8e5db1217a399fe75519878e89da4faf87b08c8448aab42aa9ddf40087bc3e959a5490d861531637f3978b2ddcda4d727e60887b6e

C:\Users\Admin\AppData\Local\Temp\_MEI31082\python3.dll

MD5 77896345d4e1c406eeff011f7a920873
SHA1 ee8cdd531418cfd05c1a6792382d895ac347216f
SHA256 1e9224ba7190b6301ef47befa8e383d0c55700255d04a36f7dac88ea9573f2fb
SHA512 3e98b1b605d70244b42a13a219f9e124944da199a88ad4302308c801685b0c45a037a76ded319d08dbf55639591404665befe2091f0f4206a9472fee58d55c22

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-console-l1-1-0.dll

MD5 c45ac67ce87993a1eb2150a4e215ccd1
SHA1 cf337047a279001680585e40629fa997ee14eeba
SHA256 002ef1614c26c22c55e9b33b4577fb6a3ed900bc27d5a0025d6d047c64bcf973
SHA512 540c73913ac933061bfb825607f3759a90e7c0be3f04fef801630375f80acf37c92693b0e6ba6e413022cc67e6a17747e43ca0ebb79f4ca89d6fae2b7720cb3d

C:\Users\Admin\AppData\Local\Temp\_MEI31082\libcrypto-3.dll

MD5 f8076a47c6f0dac4754d2a0186f63884
SHA1 d228339ff131fba16f023ec8fa40c658991eb01f
SHA256 3423134795ab8fce58190ae156d4b5d70053bebe6c9a228bea3281855e5357fa
SHA512 a6d4144cbba4a26edf563806696d312d8a3486122b165aae2c1692defc2828f3ff6bd6a7f24df730ff11c12bc60ac4408f9475c19b543ed1116b0a5d3466300b

memory/3988-1380-0x00007FFEDE110000-0x00007FFEDE125000-memory.dmp

memory/3988-1381-0x00007FFECF470000-0x00007FFECF992000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI31082\libjpeg-9.dll

MD5 c22b781bb21bffbea478b76ad6ed1a28
SHA1 66cc6495ba5e531b0fe22731875250c720262db1
SHA256 1eed2385030348c84bbdb75d41d64891be910c27fab8d20fc9e85485fcb569dd
SHA512 9b42cad4a715680a27cd79f466fd2913649b80657ff042528cba2946631387ed9fb027014d215e1baf05839509ca5915d533b91aa958ae0525dea6e2a869b9e4

C:\Users\Admin\AppData\Local\Temp\_MEI31082\freetype.dll

MD5 04a9825dc286549ee3fa29e2b06ca944
SHA1 5bed779bf591752bb7aa9428189ec7f3c1137461
SHA256 50249f68b4faf85e7cd8d1220b7626a86bc507af9ae400d08c8e365f9ab97cde
SHA512 0e937e4de6cbc9d40035b94c289c2798c77c44fc1dc7097201f9fab97c7ff9e56113c06c51693f09908283eda92945b36de67351f893d4e3162e67c078cff4ec

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-crt-utility-l1-1-0.dll

MD5 73e6469b985df8837aeaaa7123708887
SHA1 01673b8891422406bb982d07128dbb3b112b5276
SHA256 95873f3e33077346ca2a3bc7bf7daa7bd2e3048a5484dca4f4528f2b7b538bf9
SHA512 9caef7ac1ca4b43c16df34f1e1d798250b678150042857f9c7fcedb6b2a776056e6881b92c9698cfebe38be09f0af889fce393a354148e754b45afbac146e449

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-crt-time-l1-1-0.dll

MD5 a2de503c4cc56e7de302876fefaae2e7
SHA1 041d5af579283b6ecc8ebfebba21bc8a3af550f1
SHA256 864f666db947dba0cce45f9e47a985a2096cb81da843eb2e63a7fb2c8ea80e46
SHA512 e5593d4857e6b07e7f46b5ec5f6ce50d61d2f82f9d1f1f3343eef1b57e9551b05eb8c5544e1073ac14f97f302839ba08ac86b547cee2b6e7f1079cc738f5c17d

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-crt-string-l1-1-0.dll

MD5 f93b73105c623f5b60819b31924ae650
SHA1 feed1a77273538526af520c355ba165f8f9efd1f
SHA256 f104b2be7f464444232179f3db768221ee0258f9bf3f5c500553b678f2e465ce
SHA512 47e16f338f2b4d2208302eb6b46890afb92c8f8e9a4de8093f60f77b46608cd1b369fbc426ca361909044d310430390e69490c3a5930193035a906f26051467d

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-crt-stdio-l1-1-0.dll

MD5 2a2cff22add761ba49544b5169452940
SHA1 e2583066dc07dcf111930970a57ed330fda9930e
SHA256 04698815e80b8c6c799c6001b0f8220e9a8f2ff88496f808f5d6a49a1f0dab06
SHA512 88adfbba1d385c82fa29f191ee3ea854c5c4aba50b558da7c054019b371a22a7e9e90f37d62d484e3dbe75faa29c977059e1d7c4447ff69749d1b7e0bf523a51

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-crt-runtime-l1-1-0.dll

MD5 0710252cc8f1ed7288521d87c7c6aeb2
SHA1 e5f1e9f8d53d299f65f44e860f3e7deb841a28d9
SHA256 8ee3f2277018ab3e2c52969ee793a4b9ef054c269250e4bde2639f27cfda42c8
SHA512 b99293cf71f90266ce2173df0a09a46ecbfd78526b1d131eba35bf42213ad3801edcd958b2ac9919075674e017502f1be46bbdfa001d879b5562b6de8657a440

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-crt-process-l1-1-0.dll

MD5 cf363f6b59b37f7211d64e098c648a3d
SHA1 5a433297b508d6b274c43e58ea071b26a25a0402
SHA256 80ac7de93f382e9a52137a2fee0d1359a63d19595ac3c9caf72300fd478fdcf9
SHA512 642b589198c8b6d43351464c7f50dec7965c3e6f4bbc4a04feac83c3f9b6fd3860ae8d417abc83491e08d522f4ed2155c283c356acf3e1d12332921dbdec2da2

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-crt-private-l1-1-0.dll

MD5 469dae932dbb2348e4cb0be98c15bb66
SHA1 629dd000ee762686734029471c819ec3726d2b7d
SHA256 dac4a9a9150157dc0b7d1b8f91404cb137c1cc08ffcb6246d601f7a4c8d6f798
SHA512 0fba809005cb7f5e779f4330597c5f5bd36f3b7e0a9ecca609421f05f07a21bb05068a59c0f23a569ee1eadba1930c8474ca3e4f15fdcfde1fbab963544fc432

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-crt-math-l1-1-0.dll

MD5 6edfbe13cae07d22814d0394de60115d
SHA1 0aed26b5d88392ef9a4eebaa4b78bc63291c0075
SHA256 adcf89c534aace75761f79de850f0966f79bd119bd8e87635611943e6d2a317e
SHA512 396c19be2604a7751b664939e3762d32e99dfa55e410a380c9afa302786f55fc9342f9e0a7b97930ba96e843d2ade68d761f41198e1c4d0e0ae43d7e06365365

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-crt-locale-l1-1-0.dll

MD5 7b2b1566e32ecb3751083aa82f56d3f6
SHA1 8511372cc3a3800c43f642b729fd800579285f24
SHA256 ef84b20de4057bd4b64cbcecbea3b9b5c6cc671caa2c7d39d8a02437f1a37b81
SHA512 abf17270321db379732b58ffbea5feb34f62b06bdf023b7f96fb7dfd93d4d1aa9e5f8d8ec2ecb91edb65236446a552ea60fb8e96f677595c3993cdb5bb83e0c1

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-crt-heap-l1-1-0.dll

MD5 dde305b5ba450c86dc0bc240815358ed
SHA1 d3fb825bdeafe9e37e85116932b9254341acdf51
SHA256 28c2796dd9af7261873f180262ceaffb39fb529539925454b9c6cd01137e14f9
SHA512 70648d364fb28347a5f94cbefd5c5a8adb6b0d565a7c6d3624f8c3a0c76c6a51b099fac6dacb39937c23ea4208d2c095a3c63b45918c3617bc2fc71886fee0cf

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-crt-filesystem-l1-1-0.dll

MD5 9f61a852aa4c60ddaacc4d58ba922a35
SHA1 7240245e2aec02f0e3d069716e95358ae52efeb5
SHA256 e95c2ff8c37d29eb7c125a205191ed728a879e7a1527804877cc2080f411a20c
SHA512 746ff87d88fc32655121450159090b4b85c953ea89ae23fb9ff8f338c6b1ac78a87e7121a4c2c13732fbb942362d141f5a98c5ba5d62ad792a9531c95ac88fad

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-crt-environment-l1-1-0.dll

MD5 4caebb22adf188fccb49eb1da05935ea
SHA1 b9dd16e75cd5cfd06cc2db105dec90f01454b4dd
SHA256 998506d8270b5109bf9b0290302183bf1f4551b95722a9f9c15f02d1f90bd532
SHA512 1e37491f541f035a295e0350377b90512407d68ac0e46664d8f8b158ced538431df219db968042378e2a23fb5e798bb6e290a1cb1ecf27633150c197d0bb663c

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-crt-convert-l1-1-0.dll

MD5 e18a689ac01df28a36fc2508d8cc6e03
SHA1 4654999e493502baa8a77b99548a6d841d4b7c67
SHA256 ddb8e51047b92c2b3caab9956962f0af57a5d2840536c33620f07970eaddd8d1
SHA512 c6fb1d517e4383036428889bcb41b6db8f74bf0fdb9ac6cfff37b8834c1026f9a2f48d709aad4b9ac4baf3b1f3092ce5f68bbb2d07f250c599969db7f31d7dc9

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-crt-conio-l1-1-0.dll

MD5 ef555b0c47da9db3359842b4041fa669
SHA1 f3120292d39c248963ecddcdc08247faa4a5f1f7
SHA256 4b3d67596ec2f93fe9639f3f846073cb541b615070cd5094876c5f47b8b47579
SHA512 6846fc469d5c2e7719bc53068252a3139267d5ee390b6ff999c1919e81eb8543ebd2dc7873554b6d537430cdb6875aaec5d7bfb425be9d1e7668505f04268b3a

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-util-l1-1-0.dll

MD5 942fb04662bcc37fdcd80e35a53660ae
SHA1 e0dd736441dcb038ca89179878bdc25238bf314b
SHA256 716c6b088974726268612511e5190459d329a1eee7cbb7dbaa1307775ce66db8
SHA512 67fa78ffd4b68167698a09822e65c2dc6b5ec8859a6157aa3f36c95e167dbecba9266630ecfacc72748367d38484432cd5e305953fd7da4bb549a1c8d935e08d

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-timezone-l1-1-0.dll

MD5 0f6e970dea277438d33eed6a6a61709f
SHA1 34619c9343296107c404dbb11de00affe97185f9
SHA256 c88c3678a4e1bee3f12b2ce947f3bc37ed3d3231a5801ea822cc2c28fa87b078
SHA512 5122e116cb430382419fb205154b96d6e02812230b29d25c6e55f01ff889bcaa1fca9d4eebb04733ec19fb0f8f2785898b5cfe5e2204acd8e7e9884df1b9de1b

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-sysinfo-l1-2-0.dll

MD5 7284671ec86b78c730efb85947c11122
SHA1 3fbf601e0443521081356c20a6d6f3f4e6338a28
SHA256 d77af2a15be5a51cd242c142d755fcafad76af9b57e472179f8c23f0790f106d
SHA512 a29177ded3a23d7bc04f1aa903ff0a63cc9a661335b02e5b913c780bbd4a072ec5b7ca5891fd3a53e9b1b6d3b5ede4b68224da5657c35485137d22ccf8ca7d8a

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-sysinfo-l1-1-0.dll

MD5 f7901231dfeeffeb8ada850c2fe62b42
SHA1 f77d25807d6de27895494aa341075d3d9e999f45
SHA256 a7db43f8af86df869faab7d50626a097a20961579613ddd79ee5580748a4793d
SHA512 5c310067ff89f6cd624c67748c4ba80a522582ae5aae03dfaced74d152962c2d69aa669fb5e3a37091d90492852a2110539a99fb5202b0b14b86a232a8350842

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-synch-l1-2-0.dll

MD5 3edf358d26f05f473dc894d6868446a5
SHA1 1d78885a66e177a94c1af8daa35bcac4e8724f24
SHA256 6e5a3ddfdc21561c0f4e8ef77a4df9f19b1bf9212c91de92946f230e8a6ec91b
SHA512 e20d1e030688cf449ac0a3c7d4f43d5e54c3e65d44371db03c62ae8c8c33e74ca9b77d6ef95f2234b9b33cd7e9d58d7035d32c945bc43c22421641f66d55ea0f

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-synch-l1-1-0.dll

MD5 acb35f65f19e48bc685c06efaa692e26
SHA1 5a48a3d685c829fbb22281e245abbf2742398c82
SHA256 590d924e988503e023848ebdc3f3f01bfcc4e3f7717816c5a68b8f8414ab41f9
SHA512 3bb3ef453916825f675c245424bf18a847a0990398d1fbd349fe3e265aa1aa7c1bf90eedc447bf7de2eda95ed6fb2f8e4e79e3f0222536097afc0e629c5bb42a

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-string-l1-1-0.dll

MD5 698704e1735825ed67348bcd561bc5df
SHA1 7b6c821a3ddf9488e1a4126a54c5fda2155ded5c
SHA256 dce5934af79f7f22d5bd58a9fa6fcf4734ef13ca3b58a26579a6d7471e6b27e5
SHA512 27a392b95ddb368dddce19287b8da5be7f860afeb15a5735d324265b77cdcf78dc6dc33555572f13c0a4e540b8bf900bd3552a183643772708b928b4204f3e35

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-rtlsupport-l1-1-0.dll

MD5 2e107df701850a43e2baba0427859a9e
SHA1 4dac4434b88420a9a67efe4e9b19d877526d7310
SHA256 7e7950b535768988313ae1689be3844f471293e293cec4be845e17c1e8940623
SHA512 369a6133373a1e0a11f807946e32b56b310755d55560004803677dd9b107f401ea9bd9de1f4a93e50e9152f5191b6a5ff36bc78901f070752e28b1b769057c0f

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-profile-l1-1-0.dll

MD5 da5fd555e8136836d33993da6fa23c03
SHA1 02ee3584d0b3dabb0ec36a12e28ea0081a0da3b6
SHA256 6f3b67e02abb67d7fbec15a1415e1858b4900654baa52120e8d887b552b57f2c
SHA512 7425be678d7f829fa110973cee0ad4e6c6d2e3f48a121d5aee5eb619d7e540262320d4b13cfd238c5aa045c9bdcbefe715c4f0fe66e1cb45cde5ecc7c3f8483e

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-processthreads-l1-1-1.dll

MD5 605d8a1ae34b7ee0b92fb5fbdfaacd8b
SHA1 6f62d615fa91c9707ab03995a690c41cb1a7f34d
SHA256 2aaa351f7d1e423ecfd6db6550b1f7d6ef8c76afe238e8491aa7e4827615edd2
SHA512 ee7ddd2bae12e32ad78625f1a2e7efbd83962cbf1251ee429b3ee3e85170f29fec474489cee57089fe23b60fd5097b44980abaaf4ec542df757e6cad8a55c708

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-processthreads-l1-1-0.dll

MD5 2aa1981502b92392e07dc1fbf16b6480
SHA1 9511302223d575a7a108217246ee82dd77b87d30
SHA256 89e233a1b4277f34899e5c4416a9202e3a4fc154c1fb3f56832bb5d90b5e8117
SHA512 005901bf7f9284acb8da987d0b6a5b066966ebcfac1546badd6f4a613287473c0b3d1ef33eacfb270d258c041bbf8303b6068a6adcee2dc6fe6a9e6907c01411

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-processenvironment-l1-1-0.dll

MD5 fa75c06452ddf3d61913a678be6ec7e2
SHA1 4dc8d6f91cba5396f7a4a7820e5574562cce1b6d
SHA256 b958a3e2f5b42ab500995c9d258278a9ad1f8c3a4986f5a1bf04c5decdc8b29e
SHA512 180bde9a8ec16f1c0fd56b131511b79d297cbfa3ee4c9207f7e675eb8e2a295a2a3df1211e25e12854fd099e27570a12ba90d3ffb00da455b7b1ab2f11b8ee11

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-namedpipe-l1-1-0.dll

MD5 e76e0353ee10885c4153f8d5735e62cf
SHA1 cf14fbeda65e5f0b75ad770c53d9af13dc8a4c48
SHA256 f54c36f6cdf0a40ae1ab1772eb27c2e3900e9e21d4f8f2a564a1b3b0326f7dcb
SHA512 ee94cf461aa975f03c046b41ba7d89715f373c78f198a5fe4f918c811781832fadcaac374205da105b9dd76bfd63a15a3073a87b55df5833654537c4bfb971b2

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-memory-l1-1-0.dll

MD5 9b0dc77df914ae8c848226bd22df2185
SHA1 925af803f125713297bffbd3f005759ac9591b83
SHA256 074bcaf27670e09e3fda81251886e3340c72cc8d2a4deb6e78f9d2f6b8c93a3f
SHA512 978a78fd9fe5b7771db353b0c10bb0d9f05d78964e0b6a7a3e93702c41b324396508d4223b2683ebeb0b6f5a7f080a6f33a4a0d0031b468505fcf28b622510b2

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-localization-l1-2-0.dll

MD5 24739ebbf1e51b4106518b09f0d26b38
SHA1 b90e291f502afa76922e01c1eddf0f95626957f6
SHA256 7ac6b6ad7094b606bfb194230ca16b6436bcecd4669a1cfcfd880e25ef3bd106
SHA512 6da9d0aaec46e9f9dd5b0cf865075e88390500bdb7aa04f17c961ff8db8a3f1238812b31aed451583c2e1431f3e447418e745cdbc82beccfb8a004522c1b1d3d

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-libraryloader-l1-1-0.dll

MD5 0f5bed8c9c9a292aff1c4cc8065c1925
SHA1 b70fca28a5933514fd8a96c4f9c5185a377b1882
SHA256 bc3634c53e7746777421ade3c332da1218561b4f77da4fe3ce5e8c3ceb9c4b0d
SHA512 4a9f350665b1b46e47ea912e04c32db47552442d739f43b93614c9403951d55b9432a6cc9143674d3ff4e003d428098f0dc06496a9b327be573718edbd9253e3

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-kernel32-legacy-l1-1-1.dll

MD5 1190c9c96d3d54b0062b2aa07c345e07
SHA1 9da3cb7923d46eab3704e0521700bd645a27d860
SHA256 cd694dd9de1e8f62ddf41952550310c10264f677c153371b3cc3ff8f68280019
SHA512 e2284e713ea1f78bd4ebb08c6eb279ee3b85b404b96bc75fcb2a23d862815e37773edb31d7eb625f688f9d412d16d3388029e3dc53262b29dd5a6fa8c0bd83d9

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-interlocked-l1-1-0.dll

MD5 ddaef501b07a1130bd236ae285ac9055
SHA1 48febee39cd3c741af1e572a1e2a66cffc646149
SHA256 0c957fd8229184147101bd44501495a94a869122fe665fd56e6f2208ffa66a71
SHA512 9cbb1ade3b6e46400cdad04cbd6c345a08d0924c5bc1feb277c5232216b85bea2a7d38f8b8a5f65b4b6757e72f1032e87557c82f1cfaca75dca084e15398d66e

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-heap-l1-1-0.dll

MD5 45cf0dc216451c35c9c1570eee9aab29
SHA1 787aeab05fd1c0ca2dc44ed502a172997c1010a8
SHA256 fdd78958d9dd6287372197954648d433128d581c26b970cb489c59b399441691
SHA512 558559848166a2fbc4ac11a7ded85eb8fba1b8bc3435557bd7de170cd98fc6d3afe2312ae74147d467aace66178cc166a20321a51ebb5de6799023fffc6198d9

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-handle-l1-1-0.dll

MD5 bdaa0f3421a238477c2cf269d7dd138a
SHA1 72d57f9901d6d404dd1d44548a395c0d61ff863e
SHA256 f98f0004552417be91b3e15340abe1d1b02d78b45217fb93abe4f9ef6b54d108
SHA512 c2cf66fbdd1533141b537db11a2dfe5b21aa3b82a910d6e444c86ead87293bc77e760f62f70f123e6936cf2bd678786fd24f16fc781c1470b499cb672c4d07c3

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-file-l2-1-0.dll

MD5 dbc82f123f6888c0efd2aa7bee02707b
SHA1 76c95b72a671830e8590e104448f92180c10006a
SHA256 a5993dc5b4fbc0b2463537666bd0f19b3e9824fc4933490278091877bfd707f0
SHA512 547bb55c8337816494597ec796f75838594d3abd6ac24fe5692b28ef9a5af338dfeba17875854b89a21381bfaf41613e072fb632272547762283cae6474fd8c7

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-file-l1-2-0.dll

MD5 85496fce62c235a881dbe880c2b675a0
SHA1 8358f22d29ce31b9f9a8ec5ad440eb1a55f01433
SHA256 8ae99e14f909b91faa3163fc0f9c2a904de1ee5ebba342d708f747276c9d7ca8
SHA512 d0df9266b21e41a64a096ed0b567a0916d352c7fc9aa7c7ffe819c21a4e3552e79badb88c4829d2580643f86a58e191ad853de1d0e282f16f84a44a741782cc9

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-file-l1-1-0.dll

MD5 b6381298d05d704ff02fd878ea692f89
SHA1 2ae2466fcf92c19419ac59e841225ef4877374ec
SHA256 26b3ec7f0ef1d09cfaca62c823566b41be9e83606b996ce92339744d96d34a6b
SHA512 6f3ecdd01c9fd3fb722f48d992bce3234d1f17d247c736252e539171cfe2ecf9e6b282beb359f0a68ddf2142371062ad176fb74692a3820d07b81a60215afc8a

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-fibers-l1-1-1.dll

MD5 46173f3aaeb1830adb3f6cb19bc9fe13
SHA1 5bacc120a80d0ef4722d1489c0563b95f99d1a99
SHA256 affc96d5aa19b374be7a56a859980b56858e22f2a221da8513eec42ffd21a718
SHA512 15f24097564fc57c0f05b1f08043b2789b18a638452018078d262038c407a8ce16658a208c58356ba81146c7a312c054d5b7e9c8d69d19b2cb833500e90c1648

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-fibers-l1-1-0.dll

MD5 fded3e98ae081924dde40f9851967c9c
SHA1 76f3540b40df321216a77268e1d44fa27724e28a
SHA256 8d2e1a7dca9b8c4f6ea8c09bb7db9c729f1c3d16cbbb073f66101fb6f0c30f94
SHA512 64cd2af48b550b43ac424aff7e979f54038b9fcb8e78db777efdd7136efd29a26a3190fcac8d2b0e4a72cab57d6b3b5268240920a8c60b3fc95477e69ffd44f2

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-errorhandling-l1-1-0.dll

MD5 8821e530975129539a0df5ad9485fe6d
SHA1 aea17422ce8fe1ecb0d0542a0df8e3641a1a107e
SHA256 3686c5f867b56611e3766a1c03b6a0480aa99d6ae515238f004f6a2084758776
SHA512 ddcce5f3f6ce35e128c5b3933ecfccece4975e534e1bea2af04efa63dac9d3e9520eb9b3512955bd7d74c3f749169fb4a7e3ea942e895dd70bdb1a343786ca01

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-debug-l1-1-0.dll

MD5 4e82c65e6fac410d119050117d51d88c
SHA1 24e972034996da634fe9a704948f560e03933032
SHA256 4dd548f706fc8b6f72dafd6901454c45b7720d7bad5726bef3c7957f8c0ede8c
SHA512 e024f356ad94dc0b3a1654fe2cfb19a53a4b0fde0cd116d7dd4fba6f4cec60bab8df9447c13c501e75bd202585c296505b865677c77287cf350d4661eb648643

C:\Users\Admin\AppData\Local\Temp\_MEI31082\api-ms-win-core-datetime-l1-1-0.dll

MD5 7db195e84b72f05c526a87409f33ee12
SHA1 7027364a274c0f8aba2a2e272fee0c5e1e7c5ded
SHA256 ae2fa471ffb72f41c710a44a05dc6f2715ac83833e653fb611b7681599c95bd5
SHA512 405a0091fed7e9d91d495ead66c00694dcd25a770736fffc05d406e40a810181648b8f420e75641ec173fbe3ef421fbabc36b2392a1b9dbe3ea1a446af95848f

memory/3988-1382-0x00007FFEDE0F0000-0x00007FFEDE109000-memory.dmp

memory/3988-1383-0x00007FFEE06D0000-0x00007FFEE06DD000-memory.dmp

memory/3988-1385-0x00007FFECE730000-0x00007FFECE7FD000-memory.dmp

memory/3988-1384-0x00007FFEDD5F0000-0x00007FFEDD623000-memory.dmp

memory/3988-1386-0x00007FFEE04A0000-0x00007FFEE04AD000-memory.dmp

memory/3988-1390-0x00007FFEDD810000-0x00007FFEDD837000-memory.dmp

memory/3988-1389-0x00007FFECE610000-0x00007FFECE72B000-memory.dmp

memory/3988-1388-0x00007FFEDE200000-0x00007FFEDE20B000-memory.dmp

memory/3988-1387-0x00007FFECE800000-0x00007FFECEED0000-memory.dmp

memory/3988-1392-0x00007FFEDE0B0000-0x00007FFEDE0BD000-memory.dmp

memory/3988-1391-0x00007FFEDE110000-0x00007FFEDE125000-memory.dmp

memory/3988-1393-0x00007FFEDD5E0000-0x00007FFEDD5EB000-memory.dmp

memory/3988-1410-0x00007FFED5320000-0x00007FFED5332000-memory.dmp

memory/3988-1409-0x00007FFED59F0000-0x00007FFED59FD000-memory.dmp

memory/3988-1408-0x00007FFEDE0F0000-0x00007FFEDE109000-memory.dmp

memory/3988-1407-0x00007FFEDD580000-0x00007FFEDD58C000-memory.dmp

memory/3988-1406-0x00007FFED5A00000-0x00007FFED5A0B000-memory.dmp

memory/3988-1405-0x00007FFED5A10000-0x00007FFED5A1C000-memory.dmp

memory/3988-1404-0x00007FFED5A20000-0x00007FFED5A2B000-memory.dmp

memory/3988-1403-0x00007FFED5A30000-0x00007FFED5A3B000-memory.dmp

memory/3988-1402-0x00007FFED5A40000-0x00007FFED5A4C000-memory.dmp

memory/3988-1401-0x00007FFED5A50000-0x00007FFED5A5E000-memory.dmp

memory/3988-1400-0x00007FFED6510000-0x00007FFED651D000-memory.dmp

memory/3988-1399-0x00007FFED6520000-0x00007FFED652C000-memory.dmp

memory/3988-1412-0x00007FFED59E0000-0x00007FFED59EC000-memory.dmp

memory/3988-1411-0x00007FFEDD5F0000-0x00007FFEDD623000-memory.dmp

memory/3988-1398-0x00007FFEDB980000-0x00007FFEDB98B000-memory.dmp

memory/3988-1397-0x00007FFEDD1F0000-0x00007FFEDD1FC000-memory.dmp

memory/3988-1396-0x00007FFEDD200000-0x00007FFEDD20B000-memory.dmp

memory/3988-1395-0x00007FFEDD590000-0x00007FFEDD59B000-memory.dmp

memory/3988-1394-0x00007FFECF470000-0x00007FFECF992000-memory.dmp

memory/3988-1413-0x00007FFECE730000-0x00007FFECE7FD000-memory.dmp

memory/3988-1414-0x00007FFED5300000-0x00007FFED5316000-memory.dmp

memory/3988-1416-0x00007FFED52E0000-0x00007FFED52F2000-memory.dmp

memory/3988-1415-0x00007FFEE04A0000-0x00007FFEE04AD000-memory.dmp

memory/3988-1420-0x00007FFED43D0000-0x00007FFED43F2000-memory.dmp

memory/3988-1419-0x00007FFEDD810000-0x00007FFEDD837000-memory.dmp

memory/3988-1418-0x00007FFED4400000-0x00007FFED4414000-memory.dmp

memory/3988-1417-0x00007FFECE610000-0x00007FFECE72B000-memory.dmp

memory/3988-1422-0x00007FFED43B0000-0x00007FFED43CB000-memory.dmp

memory/3988-1421-0x00007FFEDE0B0000-0x00007FFEDE0BD000-memory.dmp

memory/3988-1428-0x00007FFECFD30000-0x00007FFECFD4E000-memory.dmp

memory/3988-1427-0x00007FFECF3E0000-0x00007FFECF412000-memory.dmp

memory/3988-1426-0x00007FFED5320000-0x00007FFED5332000-memory.dmp

memory/3988-1425-0x00007FFED0100000-0x00007FFED0111000-memory.dmp

memory/3988-1424-0x00007FFECF420000-0x00007FFECF46D000-memory.dmp

memory/3988-1423-0x00007FFED4390000-0x00007FFED43A9000-memory.dmp

memory/3988-1430-0x00007FFECDFF0000-0x00007FFECE028000-memory.dmp

memory/3988-1429-0x00007FFECE030000-0x00007FFECE08D000-memory.dmp

memory/3988-1432-0x00007FFECDFC0000-0x00007FFECDFEA000-memory.dmp

memory/3988-1431-0x00007FFED52E0000-0x00007FFED52F2000-memory.dmp

memory/3988-1435-0x00007FFECDF60000-0x00007FFECDF84000-memory.dmp

memory/3988-1434-0x00007FFED43D0000-0x00007FFED43F2000-memory.dmp

memory/3988-1433-0x00007FFECDF90000-0x00007FFECDFBF000-memory.dmp

memory/3988-1437-0x00007FFECDDE0000-0x00007FFECDF57000-memory.dmp

memory/3988-1436-0x00007FFED43B0000-0x00007FFED43CB000-memory.dmp

memory/3988-1438-0x00007FFECF3C0000-0x00007FFECF3D8000-memory.dmp

memory/3988-1443-0x00007FFECDDC0000-0x00007FFECDDCB000-memory.dmp

memory/3988-1442-0x00007FFECDDD0000-0x00007FFECDDDC000-memory.dmp

memory/3988-1441-0x00007FFECFD20000-0x00007FFECFD2B000-memory.dmp

memory/3988-1444-0x00007FFECF3E0000-0x00007FFECF412000-memory.dmp

memory/3988-1445-0x00007FFECDDB0000-0x00007FFECDDBC000-memory.dmp

memory/3988-1440-0x00007FFECFF20000-0x00007FFECFF2B000-memory.dmp

memory/3988-1439-0x00007FFECF420000-0x00007FFECF46D000-memory.dmp

memory/3988-1446-0x00007FFECE030000-0x00007FFECE08D000-memory.dmp

memory/3988-1448-0x00007FFECDD90000-0x00007FFECDD9C000-memory.dmp

memory/3988-1447-0x00007FFECDDA0000-0x00007FFECDDAB000-memory.dmp

memory/3988-1450-0x00007FFECDD80000-0x00007FFECDD8D000-memory.dmp

memory/3988-1449-0x00007FFECDFC0000-0x00007FFECDFEA000-memory.dmp

memory/3988-1462-0x00007FFECDDE0000-0x00007FFECDF57000-memory.dmp

memory/3988-1461-0x00007FFECE390000-0x00007FFECE39C000-memory.dmp

memory/3988-1464-0x00007FFECE350000-0x00007FFECE384000-memory.dmp

memory/3988-1463-0x00007FFECF3C0000-0x00007FFECF3D8000-memory.dmp

memory/3988-1452-0x00007FFECDD70000-0x00007FFECDD7E000-memory.dmp

memory/3988-1460-0x00007FFECE3A0000-0x00007FFECE3B2000-memory.dmp

memory/3988-1459-0x00007FFECDF60000-0x00007FFECDF84000-memory.dmp

memory/3988-1458-0x00007FFECE400000-0x00007FFECE40B000-memory.dmp

memory/3988-1457-0x00007FFECE3C0000-0x00007FFECE3CD000-memory.dmp

memory/3988-1456-0x00007FFECE3D0000-0x00007FFECE3DB000-memory.dmp

memory/3988-1455-0x00007FFECE3E0000-0x00007FFECE3EC000-memory.dmp

memory/3988-1454-0x00007FFECE3F0000-0x00007FFECE3FB000-memory.dmp

memory/3988-1453-0x00007FFECFFD0000-0x00007FFECFFDC000-memory.dmp

memory/3988-1451-0x00007FFECDF90000-0x00007FFECDFBF000-memory.dmp

memory/3988-1465-0x00007FFECE100000-0x00007FFECE34A000-memory.dmp

memory/3988-1466-0x00007FFECD570000-0x00007FFECDD6B000-memory.dmp

memory/3988-1468-0x00007FFECE0A0000-0x00007FFECE0F5000-memory.dmp

memory/3988-1467-0x00007FFECDDB0000-0x00007FFECDDBC000-memory.dmp

memory/3988-1469-0x00007FFECD260000-0x00007FFECD540000-memory.dmp

memory/3988-1470-0x00007FFECB160000-0x00007FFECD253000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_1ndzchqa.fpf.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

memory/3988-1507-0x00007FFECE800000-0x00007FFECEED0000-memory.dmp

memory/3988-1547-0x00007FFED0100000-0x00007FFED0111000-memory.dmp

memory/3988-1545-0x00007FFED4390000-0x00007FFED43A9000-memory.dmp

memory/3988-1544-0x00007FFED43B0000-0x00007FFED43CB000-memory.dmp

memory/3988-1542-0x00007FFED4400000-0x00007FFED4414000-memory.dmp

memory/3988-1541-0x00007FFED52E0000-0x00007FFED52F2000-memory.dmp

memory/3988-1540-0x00007FFED5300000-0x00007FFED5316000-memory.dmp

memory/3988-1537-0x00007FFED59F0000-0x00007FFED59FD000-memory.dmp

memory/3988-1536-0x00007FFED5A00000-0x00007FFED5A0B000-memory.dmp

memory/3988-1534-0x00007FFED5A20000-0x00007FFED5A2B000-memory.dmp

memory/3988-1533-0x00007FFED5A30000-0x00007FFED5A3B000-memory.dmp

memory/3988-1532-0x00007FFED5A40000-0x00007FFED5A4C000-memory.dmp

memory/3988-1531-0x00007FFED5A50000-0x00007FFED5A5E000-memory.dmp

memory/3988-1530-0x00007FFED6510000-0x00007FFED651D000-memory.dmp

memory/3988-1529-0x00007FFED6520000-0x00007FFED652C000-memory.dmp

memory/3988-1528-0x00007FFEDB980000-0x00007FFEDB98B000-memory.dmp

memory/3988-1527-0x00007FFEDD1F0000-0x00007FFEDD1FC000-memory.dmp

memory/3988-1526-0x00007FFEDD200000-0x00007FFEDD20B000-memory.dmp

memory/3988-1525-0x00007FFEDD580000-0x00007FFEDD58C000-memory.dmp

memory/3988-1524-0x00007FFEDD590000-0x00007FFEDD59B000-memory.dmp

memory/3988-1521-0x00007FFECE610000-0x00007FFECE72B000-memory.dmp

memory/3988-1513-0x00007FFECF470000-0x00007FFECF992000-memory.dmp

memory/3988-1539-0x00007FFED59E0000-0x00007FFED59EC000-memory.dmp

memory/3988-1538-0x00007FFED5320000-0x00007FFED5332000-memory.dmp

memory/3988-1535-0x00007FFED5A10000-0x00007FFED5A1C000-memory.dmp

memory/3988-1523-0x00007FFEDD5E0000-0x00007FFEDD5EB000-memory.dmp

memory/3988-1522-0x00007FFEDE0B0000-0x00007FFEDE0BD000-memory.dmp

memory/3988-1514-0x00007FFEDE0F0000-0x00007FFEDE109000-memory.dmp

memory/3988-1512-0x00007FFEDE110000-0x00007FFEDE125000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\_MEI9202\attrs-24.2.0.dist-info\INSTALLER

MD5 365c9bfeb7d89244f2ce01c1de44cb85
SHA1 d7a03141d5d6b1e88b6b59ef08b6681df212c599
SHA256 ceebae7b8927a3227e5303cf5e0f1f7b34bb542ad7250ac03fbcde36ec2f1508
SHA512 d220d322a4053d84130567d626a9f7bb2fb8f0b854da1621f001826dc61b0ed6d3f91793627e6f0ac2ac27aea2b986b6a7a63427f05fe004d8a2adfbdadc13c1

memory/4736-3033-0x00007FFEDE0B0000-0x00007FFEDE0BD000-memory.dmp

memory/4736-3040-0x00007FFED4400000-0x00007FFED440C000-memory.dmp

memory/4736-3039-0x00007FFED4410000-0x00007FFED441B000-memory.dmp

memory/4736-3038-0x00007FFED52E0000-0x00007FFED52EC000-memory.dmp

memory/4736-3037-0x00007FFED52F0000-0x00007FFED52FB000-memory.dmp

memory/4736-3036-0x00007FFED5300000-0x00007FFED530C000-memory.dmp

memory/4736-3035-0x00007FFED59E0000-0x00007FFED59EB000-memory.dmp

memory/4736-3032-0x00007FFECE610000-0x00007FFECE72B000-memory.dmp

memory/4736-3031-0x00007FFED5310000-0x00007FFED5337000-memory.dmp

memory/4736-3030-0x00007FFEDE200000-0x00007FFEDE20B000-memory.dmp

memory/4736-3029-0x00007FFEE04A0000-0x00007FFEE04AD000-memory.dmp

memory/4736-3024-0x00007FFECF470000-0x00007FFECF992000-memory.dmp

memory/4736-3023-0x00007FFEDD1F0000-0x00007FFEDD205000-memory.dmp

memory/4736-3018-0x00007FFECE800000-0x00007FFECEED0000-memory.dmp

memory/4736-3028-0x00007FFECE730000-0x00007FFECE7FD000-memory.dmp

memory/4736-3027-0x00007FFED59F0000-0x00007FFED5A23000-memory.dmp

memory/4736-3026-0x00007FFEE06D0000-0x00007FFEE06DD000-memory.dmp

memory/4736-3025-0x00007FFED6510000-0x00007FFED6529000-memory.dmp

memory/4736-3022-0x00007FFED5A30000-0x00007FFED5A5D000-memory.dmp

memory/4736-3021-0x00007FFEDD580000-0x00007FFEDD599000-memory.dmp

memory/4736-3020-0x00007FFEE7CF0000-0x00007FFEE7CFF000-memory.dmp

memory/4736-3019-0x00007FFEDD810000-0x00007FFEDD835000-memory.dmp