Analysis

  • max time kernel
    572s
  • max time network
    575s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/01/2023, 03:21

General

  • Target

    AsepriteToolInstaller.exe

  • Size

    14.1MB

  • MD5

    05fa8f159d573796a10ebc7ff71ead46

  • SHA1

    21596be221232066e07e454685fd87770baa5002

  • SHA256

    8e5deeda104e2d39c40cd5251f598c640e03f49a1fde55a16e2a999208f0d48a

  • SHA512

    4a23ef81563d6ad9b2e93918b431fdbba3d3e7725ed9835d8bfefb1e1028112234f9217524a994688656fe78f208ef13f8b4aec4abe48a72e87313b5928809e4

  • SSDEEP

    393216:E6UiaGcbN3gSEA/qstVBHdfczPq4yAUtw:E6OwkCK/cj3cw

Malware Config

Extracted

Path

C:\Program Files\Microsoft Visual Studio\2022\Community\Licenses\1033\ThirdPartyNotices.txt

Ransom Note
NOTICES AND INFORMATION Do Not Translate or Localize Microsoft Visual Studio This software incorporates material from the projects listed below. Updates to this file may be found at https://go.microsoft.com/fwlink/?LinkId=661288. Microsoft makes certain open source code available at https://3rdpartysource.microsoft.com, or you may send a check or money order for US $5.00, including the product name, the open source component name, and version number, to: Source Code Compliance Team Microsoft Corporation One Microsoft Way Redmond, WA 98052 USA Notwithstanding any other terms, you may reverse engineer this software to the extent required to debug changes to any libraries licensed under the GNU Lesser General Public License. 1. .NET Compiler Platform ("Roslyn") (https://github.com/dotnet/roslyn) 2. .NET CLI 3. 7-Zip (http://www.7-zip.org/) 4. abbrev.js (https://github.com/isaacs/abbrev-js) 5. acorn (https://github.com/ternjs/acorn) 6. Acorn (and other files) 7. acorn-jsx (https://github.com/RReverser/acorn-jsx) 8. acorn-loose (https://github.com/acornjs/acorn) 9. acorn-to-esprima (https://github.com/babel/acorn-to-esprima) 10. Active Directory Authentication Library (ADAL) for .NET (https://github.com/AzureAD/azure-activedirectory-library-for-dotnet) 11. ActiveState cookbook recipe "Remove duplicates from a sequence" 12. Adrian Mato Gondelle (http://yensdesign.com/2008/09/how-to-create-a-stunning-and-smooth-popup-using-jquery/) 13. agent-base (https://github.com/TooTallNate/node-agent-base) 14. Alexander ChemerisÕ ISO C9x compliant inttypes.h for Microsoft Visual Studio (http://code.google.com/p/msinttypes/) 15. align-text (https://github.com/jonschlinkert/align-text) 16. alter (https://github.com/olov/alter) 17. amdefine (https://github.com/jrburke/amdefine/) Includes: require-cs (https://github.com/requirejs/require-cs) 18. Anaconda packages (https://repo.anaconda.com/pkgs) Includes: asn1crypto Includes: bzip2 Includes: ca-certificates Includes: certifi Includes: cffi Includes: chardet Includes: conda Includes: Conda (4.7.10) Includes: conda-env Includes: conda-package-handling Includes: console_shortcut Includes: cryptography Includes: idna Includes: libarchive Includes: libiconv Includes: libxml2 Includes: lz4 Includes: lzo Includes: menuinst Includes: openssl Includes: pip Includes: powershell_shortcut Includes: pycosat Includes: pycparser Includes: pyopenssl Includes: pysocks Includes: python Includes: python-libarchive-c Includes: pywin32 Includes: requests Includes: ruamel_yaml Includes: setuptools Includes: six Includes: sqlite Includes: tqdm Includes: urllib3 Includes: vc Includes: wheel Includes: wincertstore Includes: win_inet_pton Includes: xz Includes: yaml Includes: zlib Includes: zstd 19. Astring (https://github.com/davidbonnet/astring) 20. Anaconda Python (https://www.anaconda.com/) 21. analysis-smartcn (https://github.com/elastic/elasticsearch/tree/master/plugins/analysis-smartcn) 22. Android dirname_r (https://android.googlesource.com/platform/bionic/+/android-4.0.3_r1.1/libc/bionic/dirname_r.c) 23. Android native_app_glue 24. Android Open Source Project files licensed under EPL v1 25. Android Studio (https://source.android.com/) Includes: Android Cookbook recipe "Handling the Nuances of strings.xml" Includes: CSVReader.java 26. AndroidSupportComponents (https://github.com/xamarin/AndroidSupportComponents) 27. AngularJS Intellisense (https://github.com/jmbledsoe/angularjs-visualstudio-intellisense) 28. AngularJS logo (unmodified) (https://github.com/angular/angular.js) 29. ansi (https://github.com/TooTallNate/ansi.js) 30. ansicolors (https://github.com/thlorenz/ansicolors) 31. ansi-escapes (https://github.com/sindresorhus/ansi-escapes) 32. ansi-regex (https://github.com/sindresorhus/ansi-regex) 33. ansistyles (https://github.com/thlorenz/ansistyles) 34. ansi-styles (https://github.com/chalk/ansi-styles) 35. Anti-Grain Geometry (http://antigrain.com/license/index.html#toc0002) 36. ANTLR (http://www.antlr.org/) Includes: ANTLR v3 Includes: ANTLR v4 37. antlr4cs (https://github.com/tunnelvisionlabs/antlr4cs) 38. Apache Ant (https://ant.apache.org/index.html) Includes: File with code from bzip2 Includes: File with code from Info-ZIP 39. Apache Camel (https://github.com/apache/camel) 40. Apache Hive (https://hive.apache.org) 41. Apache log4net (https://logging.apache.org/log4net/) 42. Apache Lucene (http://lucene.apache.org/core/) 43. Apache Qpid (http://qpid.apache.org/) 44. Apache Thrift (https://thrift.apache.org.) 45. applicationinsights-analytics-js (version 2.5.7) (https://github.com/microsoft/ApplicationInsights-JS/tree/master/extensions/applicationinsights-analytics-js) 46. applicationinsights-channel-js (https://github.com/Microsoft/applicationinsights-js) 47. applicationinsights-common (https://github.com/microsoft/ApplicationInsights-JS/tree/master/shared/AppInsightsCommon) 48. applicationinsights-core-js (https://github.com/microsoft/ApplicationInsights-JS/tree/master/shared/AppInsightsCore) 49. applicationinsights-dependencies-js (https://github.com/microsoft/ApplicationInsights-JS/tree/master/extensions/applicationinsights-dependencies-js) 50. applicationinsights-properties-js (https://github.com/microsoft/ApplicationInsights-JS/tree/master/extensions/applicationinsights-properties-js) 51. applicationinsights-shims (https://github.com/microsoft/ApplicationInsights-JS/tree/master/tools/shims) 52. ApplicationInsights-node.js (https://github.com/Microsoft/ApplicationInsights-node.js) 53. applicationinsights-web (https://github.com/microsoft/ApplicationInsights-JS) 54. aproba (https://github.com/iarna/aproba) 55. Archiver (https://github.com/archiverjs/node-archiver) 56. archiver-utils (https://github.com/archiverjs/archiver-utils) 57. archy (https://github.com/substack/node-archy) 58. are-we-there-yet (https://github.com/iarna/are-we-there-yet) 59. argparse (https://github.com/nodeca/argparse) 60. array-filter (https://github.com/juliangruber/array-filter) 61. array-index (https://github.com/TooTallNate/array-index) 62. array-map (https://github.com/substack/array-map) 63. array-reduce (https://github.com/substack/array-reduce.) 64. array-union (https://github.com/sindresorhus/array-union) 65. array-uniq (https://github.com/sindresorhus/array-uniq) 66. arrify (https://github.com/sindresorhus/arrify) 67. artifact-engine (artifact-engine) 68. asap (https://github.com/kriskowal/asap) 69. ASM (https://www.ow2.org/) 70. asm-analysis (https://www.ow2.org/) 71. ASMJS Validator (https://hg.mozilla.org/integration/mozilla-inbound/rev/100721f9718f) 72. asm-tree (https://www.ow2.org/) 73. asn1 (https://github.com/mcavage/node-asn1) 74. ASP.NET (http://www.asp.net/) Includes: ASP.NET Core (https://github.com/aspnet/AspNetCore) Includes: SignalR (https://github.com/SignalR/SignalR) Includes: Web Stack Components (MVC) (https://github.com/aspnet/AspNetWebStack) Includes: Web Stack Components (WebAPI) (https://github.com/aspnet/AspNetWebStack) Includes: Web Stack Components (Web Pages) (https://github.com/aspnet/AspNetWebStack) Includes: Caching (https://github.com/aspnet/Caching) Includes: Common (https://github.com/aspnet/Common) Includes: Configuration (https://github.com/aspnet/Configuration) Includes: CORS (https://github.com/aspnet/CORS) Includes: DataCommon.SQLite (https://github.com/aspnet/Microsoft.Data.Sqlite) Includes: DataProtection (https://github.com/aspnet/DataProtection) Includes: DependencyInjection (https://github.com/aspnet/DependencyInjection) Includes: Diagnostics (https://github.com/aspnet/Diagnostics) Includes: dnvm (https://github.com/aspnet/dnvm) Includes: dnx (https://github.com/aspnet/dnx) Includes: Entropy (https://github.com/aspnet/Entropy) Includes: FileSystem (https://github.com/aspnet/FileSystem) Includes: Hosting (https://github.com/aspnet/Hosting) Includes: HttpAbstractions (https://github.com/aspnet/HttpAbstractions) Includes: HttpClient (https://github.com/aspnet/HttpClient) Includes: Identity (https://github.com/aspnet/Identity) Includes: jquery-ajax-unobtrusive (https://github.com/aspnet/jquery-ajax-unobtrusive) Includes: jquery-validation-unobtrusive (https://github.com/aspnet/jquery-validation-unobtrusive) Includes: KestrelHttpServer (https://github.com/aspnet/KestrelHttpServer) Includes: Logging (https://github.com/aspnet/Logging) Includes: Options (https://github.com/aspnet/Options) Includes: Razor (https://github.com/aspnet/Razor) Includes: Routing (https://github.com/aspnet/Routing) Includes: Scaffolding (https://github.com/aspnet/Scaffolding) Includes: Security (https://github.com/aspnet/Security) Includes: Session (https://github.com/aspnet/Session) Includes: Signing (https://github.com/aspnet/Signing) Includes: StaticFiles (https://github.com/aspnet/StaticFiles) Includes: Testing (https://github.com/aspnet/Testing) Includes: UserSecrets (https://github.com/aspnet/UserSecrets) Includes: vsweb-publish (https://github.com/aspnet/vsweb-publish) Includes: WebSocketAbstractions (https://github.com/aspnet/WebSocketAbstractions) Includes: WebSockets (https://github.com/aspnet/WebSockets) 75. assert-plus (https://github.com/mcavage/node-assert-plus) 76. ast-traverse (https://github.com/olov/ast-traverse) 77. ast-types (https://github.com/benjamn/ast-types.) 78. async (https://github.com/caolan/async) 79. async-some (https://github.com/othiym23/async-some) 80. Attractive Chaos' h.h (https://github.com/attractivechaos/klib/blob/master/khash.h) 81. Autogrow Textarea Plugin (https://github.com/jevin/Autogrow-Textarea) 82. AutoRest (https://github.com/Azure/autorest) 83. aws4 (https://github.com/mhart/aws4) 84. aws-sign2 (https://github.com/request/aws-sign) 85. axios (https://github.com/mzabriskie/axios) 86. axon (https://github.com/visionmedia/axon) 87. Azure Key Vault (https://github.com/Azure/AutoRest) 88. azure-storage-net (https://github.com/Azure/azure-storage-net) 89. azure-storage-net-data-movement (https://github.com/Azure/azure-storage-net-data-movement) 90. Babel (Babylon) (https://github.com/babel/babel/) 91. Babel-eslint (https://github.com/babel/babel-eslint/) 92. babel-plugin-constant-folding (https://www.npmjs.com/package/babel-plugin-constant-folding) 93. Babel/Runtime (version 7.12.13) (https://www.npmjs.org/package/@babel/runtime/v/7.12.13) 94. babel-sublime (https://github.com/babel/babel-sublime) Includes: get-stdin 95. balanced-match (https://github.com/juliangruber/balanced-match) 96. Batch File (Sublime Packages) (https://github.com/sublimehq/Packages) 97. Beautify-html.js (https://github.com/einars/js-beautify) 98. BERKELEY YACC (http://dickey.his.com/byacc/byacc.html) 99. binary (https://github.com/substack/node-binary) 100. binutils (https://www.gnu.org/software/binutils) Includes: amd64-match.S Includes: libffi 101. bl (Buffer List) (https://github.com/rvagg/bl) 102. block-stream (https://github.com/isaacs/block-stream) 103. bluebird (http://github.com/petkaantonov/bluebird) 104. Boehm-Demers-Weiser conservative garbage collector (https://github.com/mono/mono/tree/master/libgc/include) 105. boom (https://github.com/hapijs/boom) 106. Boost (http://www.boost.org/) 107. Boost Test Library (http://boost.sourceforge.net/libs/test/doc/index.html) 108. Boost Unit Test Adapter (https://github.com/etas/vs-boost-unit-test-adapter) 109. bootstrap (https://github.com/twbs/bootstrap) 110. Bootstrap (verion 3.0.0) (http://nuget.org/packages/Twitter.Bootstrap) 111. bootstrap-touch-carousel (https://github.com/ixisio/bootstrap-touch-carousel) 112. BoringSSL (https://github.com/mono/boringssl) 113. Bouncy Castle (https://www.bouncycastle.org/csharp/) Includes: Implementation of the OCB Authenticated-Encryption Algorithm (https://tools.ietf.org/html/rfc7253) Includes: JZLib (http://www.jcraft.com/jzlib) Includes: secp256k1 (https://github.com/bitcoin-core/secp256k1) 114. Bouncy Castle JCE (http://www.bouncycastle.org/viewcvs/viewcvs.cgi/java/crypto/) 115. Bower (https://github.com/bower/bower) 116. bower-config (https://github.com/bower/config) 117. bower-endpoint-parser (https://github.com/bower/endpoint-parser) 118. bower-json (https://github.com/bower/json) 119. bower-logger (https://github.com/bower/logger) 120. bower-registry-client (https://github.com/bower/registry-client) 121. brace-expansion (https://github.com/juliangruber/brace-expansion) 122. breakable (https://github.com/olov/breakable) 123. browserkeymap (https://github.com/marijnh/browserkeymap) 124. BSD fnmatch (http://opensource.apple.com/source/gcc/gcc-5666.3/libiberty/bsearch.c) 125. BSD glibc bsearch (http://www.gnu.org/software/libc/download.html) 126. buddy.js (https://github.com/danielstjules/buddy.js) 127. buffer-crc32 (https://github.com/brianloveswords/buffer-crc32) 128. buffer-equal-constant-time (https://github.com/salesforce/buffer-equal-constant-time) 129. buffers (https://github.com/substack/node-buffers) 130. buffers (DefinitelyTyped) (https://github.com/DefinitelyTyped/DefinitelyTyped/tree/master/buffers) 131. buffer-shims (https://github.com/calvinmetcalf/buffer-shims) 132. builtin-modules ( https://github.com/sindresorhus/builtin-modules) 133. builtins (https://github.com/juliangruber/builtins) 134. C++ Standard Library (https://github.com/Microsoft/stl) 135. camelcase (https://github.com/sindresorhus/camelcase) 136. Camellia (http://www.openssl.org/~appro/camellia/) 137. capture-stack-trace (https://github.com/floatdrop/capture-stack-trace) 138. cardinal (https://github.com/thlorenz/cardinal/) 139. c-ares (http://c-ares.haxx.se) 140. caseless (https://github.com/request/caseless/) 141. cctools 142. cecil (https://github.com/jbevain/cecil/) Includes: cci Includes: CryptoConvert.cs Includes: Files copyright Juerg Billeter Includes: Files copyright Microsoft Includes: Files copyright Novell, Inc. Includes: Files copyright Ximian, Inc. Includes: Files copyright Ximian, Inc. and Xamarin Inc 143. center-align (https://github.com/jonschlinkert/center-align) 144. cfe (https://llvm.org/) Includes: unicode.org code 145. CF-Lite 146. CFStreamAbstract.h 147. chainsaw (https://github.com/substack/node-chainsaw) 148. chalk (https://github.com/chalk/chalk) 149. chmodr (https://github.com/isaacs/chmodr) 150. chownr (https://github.com/isaacs/chownr) 151. Chris SwensonÕs sorting routine implementations (https://github.com/swenson/sort) 152. Chromium (https://www.chromium.org/Home) 153. ch-siphash (https://github.com/tanglebones/ch-siphash) 154. cityhash (https://github.com/google/cityhash) 155. clang (https://clang.llvm.org/) Includes: unicode.org code 156. clang v12.0.0 (https://github.com/llvm/llvm-project/blob/llvmorg-12.0.0/clang/LICENSE.TXT) 157. clang-tools-extra (https://llvm.org/) 158. CLAP.dll (http://adrianaisemberg.github.io/CLAP/#what) 159. cli-cursor (https://github.com/sindresorhus/cli-cursor) 160. Clide (https://github.com/clariuslabs/clide) 161. cliui (https://github.com/bcoe/cliui) 162. cli-width (https://github.com/knownasilya/cli-width) 163. Clojure (https://github.com/mmcgrana/textmate-clojure) 164. clone (https://github.com/pvorb/node-clone) 165. CLR Instrumentation Engine (https://github.com/Microsoft/CLRInstrumentationEngine) 166. CMake (daemon mode) (https://github.com/steveire/CMake/tree/cmake-daemon) In
Emails

[email protected]

<[email protected]>

[email protected]

<[email protected]>

<[email protected]>

<[email protected]>

<[email protected]>

[email protected]

<[email protected]>

<[email protected]>

<[email protected]>

<[email protected]>

[email protected]

<[email protected]>

[email protected]

<[email protected]>

<[email protected]>

<[email protected]>

<[email protected]>

<[email protected]>

URLs

https://go.microsoft.com/fwlink/?LinkId=661288

https://3rdpartysource.microsoft.com

https://github.com/dotnet/roslyn

http://www.7-zip.org/

https://github.com/isaacs/abbrev-js

https://github.com/ternjs/acorn

https://github.com/RReverser/acorn-jsx

https://github.com/acornjs/acorn

https://github.com/babel/acorn-to-esprima

https://github.com/AzureAD/azure-activedirectory-library-for-dotnet

http://yensdesign.com/2008/09/how-to-create-a-stunning-and-smooth-popup-using-jquery/

https://github.com/TooTallNate/node-agent-base

http://code.google.com/p/msinttypes/

https://github.com/jonschlinkert/align-text

https://github.com/olov/alter

https://github.com/jrburke/amdefine/

https://github.com/requirejs/require-cs

https://repo.anaconda.com/pkgs

https://github.com/davidbonnet/astring

https://www.anaconda.com/

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 10 IoCs
  • Registers COM server for autorun 1 TTPs 41 IoCs
  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 59 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • Detects Pyinstaller 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 13 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\AsepriteToolInstaller.exe
    "C:\Users\Admin\AppData\Local\Temp\AsepriteToolInstaller.exe"
    1⤵
    • NTFS ADS
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1644
    • C:\Program Files (x86)\AsepriteTool\AsepriteTool.exe
      "C:\Program Files (x86)\AsepriteTool\AsepriteTool.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Program Files (x86)\AsepriteTool\AsepriteTool.exe
        "C:\Program Files (x86)\AsepriteTool\AsepriteTool.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2284
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c cmake.msi
          4⤵
          • Checks computer location settings
          • Suspicious use of WriteProcessMemory
          PID:1132
          • C:\Windows\System32\msiexec.exe
            "C:\Windows\System32\msiexec.exe" /i "C:\Program Files (x86)\AsepriteTool\cmake.msi"
            5⤵
            • Blocklisted process makes network request
            • Enumerates connected drives
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of FindShellTrayWindow
            PID:1804
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c vs.exe
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4320
          • C:\Program Files (x86)\AsepriteTool\vs.exe
            vs.exe
            5⤵
            • Executes dropped EXE
            • Checks computer location settings
            • Suspicious use of WriteProcessMemory
            PID:852
            • C:\Users\Admin\AppData\Local\Temp\3594b52f3911b86e082efeb9c2dc\vs_bootstrapper_d15\vs_setup_bootstrapper.exe
              "C:\Users\Admin\AppData\Local\Temp\3594b52f3911b86e082efeb9c2dc\vs_bootstrapper_d15\vs_setup_bootstrapper.exe" --env "_SFX_CAB_EXE_PACKAGE:C:\Program Files (x86)\AsepriteTool\vs.exe _SFX_CAB_EXE_ORIGINALWORKINGDIR:C:\Program Files (x86)\AsepriteTool"
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Drops file in Program Files directory
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3964
              • C:\Windows\SysWOW64\getmac.exe
                "getmac"
                7⤵
                  PID:5032
                • C:\Program Files (x86)\Microsoft Visual Studio\Installer\setup.exe
                  "C:\Program Files (x86)\Microsoft Visual Studio\Installer\setup.exe" /finalizeInstall install --in "C:\ProgramData\Microsoft\VisualStudio\Packages\_bootstrapper\vs_setup_bootstrapper_202301050423181977.json" --locale en-US --activityId "dc890543-aba6-4e5d-8f00-815e437caa4a" --pipe "5c1faa5c-b89d-4ce4-8791-f3e8cbd3b186"
                  7⤵
                  • Executes dropped EXE
                  • Checks computer location settings
                  • Checks processor information in registry
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of WriteProcessMemory
                  PID:4032
                  • C:\Program Files (x86)\Microsoft Visual Studio\Installer\vs_installer.windows.exe
                    "C:\Program Files (x86)\Microsoft Visual Studio\Installer\vs_installer.windows.exe" /finalizeinstall 6F320B93-EE3C-4826-85E0-ADF79F8D4C61 "Visual Studio Installer" "Microsoft Visual Studio Installer" 3.4.2246.31370 0 "C:\Program Files (x86)\Microsoft Visual Studio\Installer\setup.exe"
                    8⤵
                    • Executes dropped EXE
                    PID:3748
                  • C:\Program Files (x86)\Microsoft Visual Studio\Installer\setup.exe
                    "C:\Program Files (x86)\Microsoft Visual Studio\Installer\setup.exe" elevate --activityId dc890543-aba6-4e5d-8f00-815e437caa4a --locale en-US --pid 4032 --pipeName 99123b7c1dc846b7bf2ff31b2b49da17 --pipeSecret c8b389446d3140049a55dc76063d5a9d --serializedSession "{\"IsOptedIn\":true,\"HostName\":\"Default\",\"AppInsightsInstrumentationKey\":\"f144292e-e3b2-4011-ac90-20e5c03fbce5\",\"AsimovInstrumentationKey\":\"AIF-312cbd79-9dbb-4c48-a7da-3cc2a931cb70\",\"AppId\":1000,\"UserId\":\"07a2a331-ba4e-4b8f-8714-e7661e100da1\",\"Id\":\"85d0e8cc-8eba-457b-8dda-28161a05eef0\",\"ProcessStartTime\":638084894182841148,\"SkuName\":null,\"VSExeVersion\":null,\"BucketFiltersToEnableWatsonForFaults\":[{\"AdditionalProperties\":[],\"Id\":\"a02930d9-c607-41c3-8698-0fd9196735a5\",\"WatsonEventType\":\"VisualStudioNonFatalErrors2\",\"BucketParameterFilters\":[null,null,\"(?i)vs\\.setup.*\",null,null,null,null,null,null,null]},{\"AdditionalProperties\":[],\"Id\":\"64a13603-6d89-42e4-a299-13f77e5ad306\",\"WatsonEventType\":\"VisualStudioNonFatalErrors2\",\"BucketParameterFilters\":[null,null,\"(?i)vs\\.willow.*\",null,null,null,null,null,null,null]}],\"BucketFiltersToAddDumpsToFaults\":[]}"
                    8⤵
                    • Executes dropped EXE
                    • Adds Run key to start application
                    • Drops file in Program Files directory
                    • Modifies registry class
                    • Modifies system certificate store
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3316
                    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe
                      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen.exe" queue pause
                      9⤵
                      • Drops file in Windows directory
                      PID:2000
                    • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe
                      "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.exe" queue pause
                      9⤵
                      • Drops file in Windows directory
                      PID:2600
                    • C:\ProgramData\Microsoft\VisualStudio\Packages\Microsoft.VisualStudio.Initializer,version=17.4.33006.217\VSInitializer.exe
                      "C:\ProgramData\Microsoft\VisualStudio\Packages\Microsoft.VisualStudio.Initializer,version=17.4.33006.217\VSInitializer.exe" -Operation Install -InstallationID 4a60cdb3 -InstallationName VisualStudio/17.4.3+33205.214 -InstallationVersion 17.4.33205.214 -InstallationWorkloads Microsoft.VisualStudio.Workload.CoreEditor,Microsoft.VisualStudio.Workload.NativeDesktop -InstallationPackages Microsoft.VisualStudio.Component.CoreEditor,Microsoft.VisualStudio.Component.TypeScript.TSServer,Microsoft.VisualStudio.ComponentGroup.WebToolsExtensions,Microsoft.VisualStudio.Component.JavaScript.TypeScript,Microsoft.VisualStudio.Component.Roslyn.Compiler,Microsoft.Component.MSBuild,Microsoft.VisualStudio.Component.Roslyn.LanguageServices,Microsoft.VisualStudio.Component.TextTemplating,Microsoft.VisualStudio.Component.NuGet,Microsoft.VisualStudio.Component.Debugger.JustInTime,Component.Microsoft.VisualStudio.LiveShare.2022,Microsoft.VisualStudio.Component.IntelliCode,Microsoft.VisualStudio.Component.VC.CoreIde,Microsoft.VisualStudio.Component.VC.Tools.x86.x64,Microsoft.VisualStudio.Component.Graphics.Tools,Microsoft.VisualStudio.Component.VC.DiagnosticTools,Microsoft.VisualStudio.Component.Windows11SDK.22000,Microsoft.VisualStudio.Component.VC.ATL,Microsoft.VisualStudio.Component.VC.Redist.14.Latest,Microsoft.VisualStudio.ComponentGroup.NativeDesktop.Core,Microsoft.VisualStudio.ComponentGroup.WebToolsExtensions.CMake,Microsoft.VisualStudio.Component.VC.CMake.Project,Microsoft.VisualStudio.Component.VC.TestAdapterForBoostTest,Microsoft.VisualStudio.Component.VC.TestAdapterForGoogleTest,Microsoft.VisualStudio.Component.VC.ASAN -InstallationPath """C:\Program Files\Microsoft Visual Studio\2022\Community""" -ComponentId Microsoft.VisualStudio.Product.Community -ChannelsPath """https://aka.ms/vs/17/release/channel""" -SetupEngineFilePath """C:\Program Files (x86)\Microsoft Visual Studio\Installer\setup.exe""" -Log """C:\Users\Admin\AppData\Local\Temp\dd_setup_20230105042646_010_Microsoft.VisualStudio.Initializer.log"""
                      9⤵
                      • Executes dropped EXE
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5040
                    • C:\ProgramData\Microsoft\VisualStudio\Packages\Microsoft.Build.UnGAC,version=17.4.1.2260106,chip=neutral,language=neutral\Microsoft.Build.UnGAC.exe
                      "C:\ProgramData\Microsoft\VisualStudio\Packages\Microsoft.Build.UnGAC,version=17.4.1.2260106,chip=neutral,language=neutral\Microsoft.Build.UnGAC.exe"
                      9⤵
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      PID:3372
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Registers COM server for autorun
      • Enumerates connected drives
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1612
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 91B65C0EADCDE5686FA6586B6AED0DA4
        2⤵
        • Loads dropped DLL
        PID:4204
      • C:\ProgramData\Microsoft\VisualStudio\SetupWMI\MofCompiler.exe
        "C:\ProgramData\Microsoft\VisualStudio\SetupWMI\MofCompiler.exe" -autorecover "C:\ProgramData\Microsoft\VisualStudio\SetupWMI\Microsoft.VisualStudio.Setup.Management.mof"
        2⤵
        • Executes dropped EXE
        • Checks processor information in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:952
        • C:\Windows\SYSTEM32\getmac.exe
          "getmac"
          3⤵
            PID:2964
          • C:\Windows\system32\wbem\mofcomp.exe
            "C:\Windows\system32\wbem\mofcomp" -autorecover C:\ProgramData\Microsoft\VisualStudio\SetupWMI\Microsoft.VisualStudio.Setup.Management.mof
            3⤵
            • Drops file in System32 directory
            PID:2436
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        1⤵
        • Checks SCSI registry key(s)
        • Checks processor information in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:4808
      • C:\Windows\system32\control.exe
        "C:\Windows\system32\control.exe" SYSTEM
        1⤵
          PID:4436
        • C:\Windows\SysWOW64\DllHost.exe
          C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
          1⤵
            PID:4060
          • C:\Windows\explorer.exe
            C:\Windows\explorer.exe /factory,{5BD95610-9434-43C2-886C-57852CC8A120} -Embedding
            1⤵
            • Checks processor information in registry
            • Modifies Internet Explorer settings
            • Suspicious behavior: AddClipboardFormatListener
            PID:1872
          • C:\Windows\System32\rundll32.exe
            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
            1⤵
              PID:4616

            Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Program Files (x86)\AsepriteTool\AsepriteTool.exe

                    Filesize

                    13.1MB

                    MD5

                    b7e035d87be0a8f9122fd170e628433d

                    SHA1

                    53b74d97978c6b9b0b1bf4b5d713668d1594bf56

                    SHA256

                    a8b06301ce0f08d8311d4fc588f3c4178f118773a06d74300cc9e0b250e90f3e

                    SHA512

                    557ff7607e1a6bcdf08038d786d9bffa5bc2f6c5015d8be1291d65a3fb90bfbe769a52097321fc7341e33b3d3c13925dd4d58326fceb62b7892b8c3fb019f737

                  • C:\Program Files (x86)\AsepriteTool\AsepriteTool.exe

                    Filesize

                    13.1MB

                    MD5

                    b7e035d87be0a8f9122fd170e628433d

                    SHA1

                    53b74d97978c6b9b0b1bf4b5d713668d1594bf56

                    SHA256

                    a8b06301ce0f08d8311d4fc588f3c4178f118773a06d74300cc9e0b250e90f3e

                    SHA512

                    557ff7607e1a6bcdf08038d786d9bffa5bc2f6c5015d8be1291d65a3fb90bfbe769a52097321fc7341e33b3d3c13925dd4d58326fceb62b7892b8c3fb019f737

                  • C:\Program Files (x86)\AsepriteTool\AsepriteTool.exe

                    Filesize

                    13.1MB

                    MD5

                    b7e035d87be0a8f9122fd170e628433d

                    SHA1

                    53b74d97978c6b9b0b1bf4b5d713668d1594bf56

                    SHA256

                    a8b06301ce0f08d8311d4fc588f3c4178f118773a06d74300cc9e0b250e90f3e

                    SHA512

                    557ff7607e1a6bcdf08038d786d9bffa5bc2f6c5015d8be1291d65a3fb90bfbe769a52097321fc7341e33b3d3c13925dd4d58326fceb62b7892b8c3fb019f737

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\VCRUNTIME140.dll

                    Filesize

                    94KB

                    MD5

                    a87575e7cf8967e481241f13940ee4f7

                    SHA1

                    879098b8a353a39e16c79e6479195d43ce98629e

                    SHA256

                    ded5adaa94341e6c62aea03845762591666381dca30eb7c17261dd154121b83e

                    SHA512

                    e112f267ae4c9a592d0dd2a19b50187eb13e25f23ded74c2e6ccde458bcdaee99f4e3e0a00baf0e3362167ae7b7fe4f96ecbcd265cc584c1c3a4d1ac316e92f0

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\VCRUNTIME140.dll

                    Filesize

                    94KB

                    MD5

                    a87575e7cf8967e481241f13940ee4f7

                    SHA1

                    879098b8a353a39e16c79e6479195d43ce98629e

                    SHA256

                    ded5adaa94341e6c62aea03845762591666381dca30eb7c17261dd154121b83e

                    SHA512

                    e112f267ae4c9a592d0dd2a19b50187eb13e25f23ded74c2e6ccde458bcdaee99f4e3e0a00baf0e3362167ae7b7fe4f96ecbcd265cc584c1c3a4d1ac316e92f0

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\_asyncio.pyd

                    Filesize

                    59KB

                    MD5

                    483bfc095eb82f33f46aefbb21d97012

                    SHA1

                    def348a201c9d1434514ca9f5fc7385ca0bd2184

                    SHA256

                    5e25e2823ed0571cfdbae0b1d1347ae035293f2b0ac454fb8b0388f3600fd4b6

                    SHA512

                    fe38b3585fbfaf7465b31fbc124420cfbd1b719ea72a9ae9f24103d056c8fa9ae21c2a7dd3073810222405457beff89bbb688daeced3219351a30992a6721705

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\_asyncio.pyd

                    Filesize

                    59KB

                    MD5

                    483bfc095eb82f33f46aefbb21d97012

                    SHA1

                    def348a201c9d1434514ca9f5fc7385ca0bd2184

                    SHA256

                    5e25e2823ed0571cfdbae0b1d1347ae035293f2b0ac454fb8b0388f3600fd4b6

                    SHA512

                    fe38b3585fbfaf7465b31fbc124420cfbd1b719ea72a9ae9f24103d056c8fa9ae21c2a7dd3073810222405457beff89bbb688daeced3219351a30992a6721705

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\_bz2.pyd

                    Filesize

                    77KB

                    MD5

                    a1fbcfbd82de566a6c99d1a7ab2d8a69

                    SHA1

                    3e8ba4c925c07f17c7dffab8fbb7b8b8863cad76

                    SHA256

                    0897e209676f5835f62e5985d7793c884fd91b0cfdfaff893fc05176f2f82095

                    SHA512

                    55679427c041b2311cff4e97672102962f9d831e84f06f05600ecdc3826f6be5046aa541955f57f06e82ee72a4ee36f086da1f664f493fbe4cc0806e925afa04

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\_bz2.pyd

                    Filesize

                    77KB

                    MD5

                    a1fbcfbd82de566a6c99d1a7ab2d8a69

                    SHA1

                    3e8ba4c925c07f17c7dffab8fbb7b8b8863cad76

                    SHA256

                    0897e209676f5835f62e5985d7793c884fd91b0cfdfaff893fc05176f2f82095

                    SHA512

                    55679427c041b2311cff4e97672102962f9d831e84f06f05600ecdc3826f6be5046aa541955f57f06e82ee72a4ee36f086da1f664f493fbe4cc0806e925afa04

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\_ctypes.pyd

                    Filesize

                    116KB

                    MD5

                    92276f41ff9c856f4dbfa6508614e96c

                    SHA1

                    5bc8c3555e3407a3c78385ff2657de3dec55988e

                    SHA256

                    9ab1f8cbb50db3d9a00f74447a2275a89ec52d1139fc0a93010e59c412c2c850

                    SHA512

                    9df63ef04ea890dd0d38a26ac64a92392cf0a8d0ad77929727238e9e456450518404c1b6bb40844522fca27761c4e864550aacb96e825c4e4b367a59892a09e7

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\_ctypes.pyd

                    Filesize

                    116KB

                    MD5

                    92276f41ff9c856f4dbfa6508614e96c

                    SHA1

                    5bc8c3555e3407a3c78385ff2657de3dec55988e

                    SHA256

                    9ab1f8cbb50db3d9a00f74447a2275a89ec52d1139fc0a93010e59c412c2c850

                    SHA512

                    9df63ef04ea890dd0d38a26ac64a92392cf0a8d0ad77929727238e9e456450518404c1b6bb40844522fca27761c4e864550aacb96e825c4e4b367a59892a09e7

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\_hashlib.pyd

                    Filesize

                    59KB

                    MD5

                    ad6e31dba413be7e082fab3dbafb3ecc

                    SHA1

                    f26886c841d1c61fb0da14e20e57e7202eefbacc

                    SHA256

                    2e30544d07f1c55d741b03992ea57d1aa519edaaa121e889f301a5b8b6557fe4

                    SHA512

                    6401664e5c942d98c6fa955cc2424dfa0c973bd0ac1e515f7640c975bba366af1b3e403ea50e753f837dcd82a04af2ce043e22b15fa9976af7cbb30b3ac80452

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\_hashlib.pyd

                    Filesize

                    59KB

                    MD5

                    ad6e31dba413be7e082fab3dbafb3ecc

                    SHA1

                    f26886c841d1c61fb0da14e20e57e7202eefbacc

                    SHA256

                    2e30544d07f1c55d741b03992ea57d1aa519edaaa121e889f301a5b8b6557fe4

                    SHA512

                    6401664e5c942d98c6fa955cc2424dfa0c973bd0ac1e515f7640c975bba366af1b3e403ea50e753f837dcd82a04af2ce043e22b15fa9976af7cbb30b3ac80452

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\_lzma.pyd

                    Filesize

                    150KB

                    MD5

                    a6bee109071bbcf24e4d82498d376f82

                    SHA1

                    1babacdfaa60e39e21602908047219d111ed8657

                    SHA256

                    ce72d59a0e96077c9ea3f1fd7b011287248dc8d80fd3c16916a1d9040a9a941f

                    SHA512

                    8cb2dafd19f212e71fa32cb74dad303af68eaa77a63ccf6d3a6ae82e09ac988f71fe82f8f2858a9c616b06dc42023203fa9f7511fac32023be0bc8392272c336

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\_lzma.pyd

                    Filesize

                    150KB

                    MD5

                    a6bee109071bbcf24e4d82498d376f82

                    SHA1

                    1babacdfaa60e39e21602908047219d111ed8657

                    SHA256

                    ce72d59a0e96077c9ea3f1fd7b011287248dc8d80fd3c16916a1d9040a9a941f

                    SHA512

                    8cb2dafd19f212e71fa32cb74dad303af68eaa77a63ccf6d3a6ae82e09ac988f71fe82f8f2858a9c616b06dc42023203fa9f7511fac32023be0bc8392272c336

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\_overlapped.pyd

                    Filesize

                    44KB

                    MD5

                    bf3e86152b52d3f0e73d0767cde63f9f

                    SHA1

                    3863c480a2d9a24288d63f83fa2586664ec813a2

                    SHA256

                    20c94846417ee3ca43daa5fae61595ad7e52645657fda5effe64800fe335ff0d

                    SHA512

                    8643f94ece38246769ff9ba87a249b8afde137cf193ff4d452937197ce576816c1ce044c4ad2951bc5535cc3acf1b27e9f2be043b8175c5a2ca2190b05dc0235

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\_overlapped.pyd

                    Filesize

                    44KB

                    MD5

                    bf3e86152b52d3f0e73d0767cde63f9f

                    SHA1

                    3863c480a2d9a24288d63f83fa2586664ec813a2

                    SHA256

                    20c94846417ee3ca43daa5fae61595ad7e52645657fda5effe64800fe335ff0d

                    SHA512

                    8643f94ece38246769ff9ba87a249b8afde137cf193ff4d452937197ce576816c1ce044c4ad2951bc5535cc3acf1b27e9f2be043b8175c5a2ca2190b05dc0235

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\_queue.pyd

                    Filesize

                    26KB

                    MD5

                    8dd33fe76645636520c5d976b8a2b6fc

                    SHA1

                    12988ddd52cbb0ce0f3b96ce19a1827b237ed5f7

                    SHA256

                    8e7e758150ea066299a956f268c3eb04bc800e9f3395402cd407c486844a9595

                    SHA512

                    e7b4b5662ebd8efb2e4b6f47eb2021afacd52b100db2df66331ca79a4fb2149cac621d5f18ab8ab9cfadbd677274db798ebad9b1d3e46e29f4c92828fd88c187

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\_queue.pyd

                    Filesize

                    26KB

                    MD5

                    8dd33fe76645636520c5d976b8a2b6fc

                    SHA1

                    12988ddd52cbb0ce0f3b96ce19a1827b237ed5f7

                    SHA256

                    8e7e758150ea066299a956f268c3eb04bc800e9f3395402cd407c486844a9595

                    SHA512

                    e7b4b5662ebd8efb2e4b6f47eb2021afacd52b100db2df66331ca79a4fb2149cac621d5f18ab8ab9cfadbd677274db798ebad9b1d3e46e29f4c92828fd88c187

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\_socket.pyd

                    Filesize

                    73KB

                    MD5

                    c5378bac8c03d7ef46305ee8394560f5

                    SHA1

                    2aa7bc90c0ec4d21113b8aa6709569d59fadd329

                    SHA256

                    130de3506471878031aecc4c9d38355a4719edd3786f27262a724efc287a47b9

                    SHA512

                    1ecb88c62a9daad93ec85f137440e782dcc40d7f1598b5809ab41bf86a5c97224e2361c0e738c1387c6376f2f24d284583fd001c4e1324d72d6989d0b84bf856

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\_socket.pyd

                    Filesize

                    73KB

                    MD5

                    c5378bac8c03d7ef46305ee8394560f5

                    SHA1

                    2aa7bc90c0ec4d21113b8aa6709569d59fadd329

                    SHA256

                    130de3506471878031aecc4c9d38355a4719edd3786f27262a724efc287a47b9

                    SHA512

                    1ecb88c62a9daad93ec85f137440e782dcc40d7f1598b5809ab41bf86a5c97224e2361c0e738c1387c6376f2f24d284583fd001c4e1324d72d6989d0b84bf856

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\_ssl.pyd

                    Filesize

                    152KB

                    MD5

                    9d810454bc451ff440ec95de36088909

                    SHA1

                    8c890b934a2d84c548a09461ca1e783810f075be

                    SHA256

                    5a4c78adedf0bcb5fc422faac619b4c7b57e3d7ba4f2d47a98c1fb81a503b6b7

                    SHA512

                    0800666f848faec976366dbfd2c65e7b7e1d8375d5d9e7d019bf364a1f480216c271c3bcf994dbab19290d336cf691cd8235e636f3dbc4d2a77f4760871c19ed

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\_ssl.pyd

                    Filesize

                    152KB

                    MD5

                    9d810454bc451ff440ec95de36088909

                    SHA1

                    8c890b934a2d84c548a09461ca1e783810f075be

                    SHA256

                    5a4c78adedf0bcb5fc422faac619b4c7b57e3d7ba4f2d47a98c1fb81a503b6b7

                    SHA512

                    0800666f848faec976366dbfd2c65e7b7e1d8375d5d9e7d019bf364a1f480216c271c3bcf994dbab19290d336cf691cd8235e636f3dbc4d2a77f4760871c19ed

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\_uuid.pyd

                    Filesize

                    20KB

                    MD5

                    6cfc03bc247a7b8c3c38f1841319f348

                    SHA1

                    c28cf20c3e1839cff5dce35a9ffd20aa4ac2a2cf

                    SHA256

                    b7fd172339478adaa5f4060eb760f905a2af55ce7e017b57de61ee09dcb09750

                    SHA512

                    bd123566a104568e2ec407b35446cb07c660035a77a1e11a8d8d90518c1a83b6815bf694676fa003b074126dcd0594457195f835df7bc828df1195db6584d23b

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\_uuid.pyd

                    Filesize

                    20KB

                    MD5

                    6cfc03bc247a7b8c3c38f1841319f348

                    SHA1

                    c28cf20c3e1839cff5dce35a9ffd20aa4ac2a2cf

                    SHA256

                    b7fd172339478adaa5f4060eb760f905a2af55ce7e017b57de61ee09dcb09750

                    SHA512

                    bd123566a104568e2ec407b35446cb07c660035a77a1e11a8d8d90518c1a83b6815bf694676fa003b074126dcd0594457195f835df7bc828df1195db6584d23b

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\base_library.zip

                    Filesize

                    812KB

                    MD5

                    73d81c2115e53003f3dad7fd0a109c70

                    SHA1

                    13261a53023854ad0ca8a4c0e66f9003da541525

                    SHA256

                    fd113fa1f7379ac2193bac8475121b53edf35d2aea559fb5ee514e46622ea5a7

                    SHA512

                    0d9b47cbb3c6b638c9f58e86f1c4243647f129425b36818e2f39d7cd88ef4e5720535cb6034829822b96a126a2ed40a4ea116ce748ae77c8527a6ead15476a0b

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\gevent\_gevent_c_greenlet_primitives.cp310-win_amd64.pyd

                    Filesize

                    68KB

                    MD5

                    4dfdc5909ab38c63d20357fa816b605c

                    SHA1

                    06a3e515aa371143ac9a014573de243c4ad13406

                    SHA256

                    56149ffbd83b4b1a6dd642ccf06434f27cd0eaabc1a4c3cf2e61ad10474bbbcd

                    SHA512

                    11a9bc68eb7c7d039aef8133d6cd8478b324ececedfb33141f28242e0a46d35d891a300f19d296d6ed959677869faf8cdb6390920e251171773d826d914437b0

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\gevent\_gevent_c_greenlet_primitives.cp310-win_amd64.pyd

                    Filesize

                    68KB

                    MD5

                    4dfdc5909ab38c63d20357fa816b605c

                    SHA1

                    06a3e515aa371143ac9a014573de243c4ad13406

                    SHA256

                    56149ffbd83b4b1a6dd642ccf06434f27cd0eaabc1a4c3cf2e61ad10474bbbcd

                    SHA512

                    11a9bc68eb7c7d039aef8133d6cd8478b324ececedfb33141f28242e0a46d35d891a300f19d296d6ed959677869faf8cdb6390920e251171773d826d914437b0

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\gevent\_gevent_c_hub_local.cp310-win_amd64.pyd

                    Filesize

                    59KB

                    MD5

                    cc9457d2bc4fb29f045daf59fad376be

                    SHA1

                    4be0cefa524361a6b894333a66624e1aa4ba995c

                    SHA256

                    2e13275af9bfe870fe98ec258da2a8da6e2b44e2435962011f979e2230a4a3b3

                    SHA512

                    58fc99bfc674f7652da64b6ef6539aaedc6c2cfaba6b217c7379ca4251060fc46120537e7d2035d897d81b307c8b6316e5398ba5eb7fd4bc7cec74f4f921ab73

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\gevent\_gevent_c_hub_local.cp310-win_amd64.pyd

                    Filesize

                    59KB

                    MD5

                    cc9457d2bc4fb29f045daf59fad376be

                    SHA1

                    4be0cefa524361a6b894333a66624e1aa4ba995c

                    SHA256

                    2e13275af9bfe870fe98ec258da2a8da6e2b44e2435962011f979e2230a4a3b3

                    SHA512

                    58fc99bfc674f7652da64b6ef6539aaedc6c2cfaba6b217c7379ca4251060fc46120537e7d2035d897d81b307c8b6316e5398ba5eb7fd4bc7cec74f4f921ab73

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\gevent\_gevent_c_hub_primitives.cp310-win_amd64.pyd

                    Filesize

                    129KB

                    MD5

                    49cd12122fbf4e9cf44578a135bd3f35

                    SHA1

                    09098a192374f591cd03e757101f53e40ee19458

                    SHA256

                    a0f6e708b072ad669843d4b3e52b2ce63a09d46ce6d10c4c175111f994e7240e

                    SHA512

                    5bc3268bf252d7e7866e1c46ffd1b981ac5b61771b057e04ee9c032aa351f8bded932069d81803b28335363a6494d9bbd00e3e46a51c3cdcb3524968b3b0b34f

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\gevent\_gevent_c_waiter.cp310-win_amd64.pyd

                    Filesize

                    83KB

                    MD5

                    11a4947ef44d88419f8ff480ff6b3e4f

                    SHA1

                    0545414855171afe6b1d89796d9cbfe4b8a6db45

                    SHA256

                    2c98244a2e1465ba1a2c6bf9dbfb690a5ea6d116f463751c22afa4d3db2e4b4c

                    SHA512

                    183613b7e73ee1245fa4772e90cb7444c4f04cc82c21f977b68a4ebb03fafab6b400620a8515401fa6168693a4ab0cce3280573c90b965748a15995dbd019a0b

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\gevent\_gevent_c_waiter.cp310-win_amd64.pyd

                    Filesize

                    83KB

                    MD5

                    11a4947ef44d88419f8ff480ff6b3e4f

                    SHA1

                    0545414855171afe6b1d89796d9cbfe4b8a6db45

                    SHA256

                    2c98244a2e1465ba1a2c6bf9dbfb690a5ea6d116f463751c22afa4d3db2e4b4c

                    SHA512

                    183613b7e73ee1245fa4772e90cb7444c4f04cc82c21f977b68a4ebb03fafab6b400620a8515401fa6168693a4ab0cce3280573c90b965748a15995dbd019a0b

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\gevent\libev\corecext.cp310-win_amd64.pyd

                    Filesize

                    300KB

                    MD5

                    5d6ac9da916c2873bad00af0060f8dd4

                    SHA1

                    d57d82b3ec163850ac429f91938dc0f439b6ab14

                    SHA256

                    5d303111c703ec8227abae7260acc93c991b61114d225f76261f83e0ef0d3ef8

                    SHA512

                    a938454c9f8657de5ff6f52ce13881d32b9dd584cf8c3e3d8a92fdf81701cf463b3956e5bf288c5b21ceb9d5db9214c4af27dd0a1d8563d1d990f52569b4bc6a

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\gevent\libev\corecext.cp310-win_amd64.pyd

                    Filesize

                    300KB

                    MD5

                    5d6ac9da916c2873bad00af0060f8dd4

                    SHA1

                    d57d82b3ec163850ac429f91938dc0f439b6ab14

                    SHA256

                    5d303111c703ec8227abae7260acc93c991b61114d225f76261f83e0ef0d3ef8

                    SHA512

                    a938454c9f8657de5ff6f52ce13881d32b9dd584cf8c3e3d8a92fdf81701cf463b3956e5bf288c5b21ceb9d5db9214c4af27dd0a1d8563d1d990f52569b4bc6a

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\greenlet\_greenlet.cp310-win_amd64.pyd

                    Filesize

                    30KB

                    MD5

                    79f57480da12d1fe3cf7afbaf07dcd7a

                    SHA1

                    971090163433ff7b2feee1b71964186dbc8e6967

                    SHA256

                    5014e6a60117af9691d1a9c8cd40989e775543a4876a5aa8f9e5ba63ca2fffef

                    SHA512

                    b3d1653eaa9ad87a97eb393bbee0ae81272f960664f9a312d1a55db787f80b27a7b7ccc9acca93fbd56e121e4b2fe5e08258bae47c4451525d40250a7a365f3b

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\greenlet\_greenlet.cp310-win_amd64.pyd

                    Filesize

                    30KB

                    MD5

                    79f57480da12d1fe3cf7afbaf07dcd7a

                    SHA1

                    971090163433ff7b2feee1b71964186dbc8e6967

                    SHA256

                    5014e6a60117af9691d1a9c8cd40989e775543a4876a5aa8f9e5ba63ca2fffef

                    SHA512

                    b3d1653eaa9ad87a97eb393bbee0ae81272f960664f9a312d1a55db787f80b27a7b7ccc9acca93fbd56e121e4b2fe5e08258bae47c4451525d40250a7a365f3b

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\libcrypto-1_1.dll

                    Filesize

                    3.3MB

                    MD5

                    ab01c808bed8164133e5279595437d3d

                    SHA1

                    0f512756a8db22576ec2e20cf0cafec7786fb12b

                    SHA256

                    9c0a0a11629cced6a064932e95a0158ee936739d75a56338702fed97cb0bad55

                    SHA512

                    4043cda02f6950abdc47413cfd8a0ba5c462f16bcd4f339f9f5a690823f4d0916478cab5cae81a3d5b03a8a196e17a716b06afee3f92dec3102e3bbc674774f2

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\libcrypto-1_1.dll

                    Filesize

                    3.3MB

                    MD5

                    ab01c808bed8164133e5279595437d3d

                    SHA1

                    0f512756a8db22576ec2e20cf0cafec7786fb12b

                    SHA256

                    9c0a0a11629cced6a064932e95a0158ee936739d75a56338702fed97cb0bad55

                    SHA512

                    4043cda02f6950abdc47413cfd8a0ba5c462f16bcd4f339f9f5a690823f4d0916478cab5cae81a3d5b03a8a196e17a716b06afee3f92dec3102e3bbc674774f2

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\libcrypto-1_1.dll

                    Filesize

                    3.3MB

                    MD5

                    ab01c808bed8164133e5279595437d3d

                    SHA1

                    0f512756a8db22576ec2e20cf0cafec7786fb12b

                    SHA256

                    9c0a0a11629cced6a064932e95a0158ee936739d75a56338702fed97cb0bad55

                    SHA512

                    4043cda02f6950abdc47413cfd8a0ba5c462f16bcd4f339f9f5a690823f4d0916478cab5cae81a3d5b03a8a196e17a716b06afee3f92dec3102e3bbc674774f2

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\libffi-7.dll

                    Filesize

                    32KB

                    MD5

                    eef7981412be8ea459064d3090f4b3aa

                    SHA1

                    c60da4830ce27afc234b3c3014c583f7f0a5a925

                    SHA256

                    f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

                    SHA512

                    dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\libffi-7.dll

                    Filesize

                    32KB

                    MD5

                    eef7981412be8ea459064d3090f4b3aa

                    SHA1

                    c60da4830ce27afc234b3c3014c583f7f0a5a925

                    SHA256

                    f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

                    SHA512

                    dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\libssl-1_1.dll

                    Filesize

                    682KB

                    MD5

                    de72697933d7673279fb85fd48d1a4dd

                    SHA1

                    085fd4c6fb6d89ffcc9b2741947b74f0766fc383

                    SHA256

                    ed1c8769f5096afd000fc730a37b11177fcf90890345071ab7fbceac684d571f

                    SHA512

                    0fd4678c65da181d7c27b19056d5ab0e5dd0e9714e9606e524cdad9e46ec4d0b35fe22d594282309f718b30e065f6896674d3edce6b3b0c8eb637a3680715c2c

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\libssl-1_1.dll

                    Filesize

                    682KB

                    MD5

                    de72697933d7673279fb85fd48d1a4dd

                    SHA1

                    085fd4c6fb6d89ffcc9b2741947b74f0766fc383

                    SHA256

                    ed1c8769f5096afd000fc730a37b11177fcf90890345071ab7fbceac684d571f

                    SHA512

                    0fd4678c65da181d7c27b19056d5ab0e5dd0e9714e9606e524cdad9e46ec4d0b35fe22d594282309f718b30e065f6896674d3edce6b3b0c8eb637a3680715c2c

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\lxml\_elementpath.cp310-win_amd64.pyd

                    Filesize

                    132KB

                    MD5

                    6831f1165a90a4306e7bb0306a8a55fb

                    SHA1

                    b540c17ae0ce3ed87a61bf17a38c81dfd599dff5

                    SHA256

                    cd462d674e68b08515fafce8c5d46f1c76f175f587c4e20336cf443e2f3eb131

                    SHA512

                    6ecd73dcb6e15abadac477e3cd087ef292258771f148e73624e7575ed973a9b3717b34791fa450af7e7e4a37e6f78bb98991bb4ee031cb44465379022232fa87

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\lxml\_elementpath.cp310-win_amd64.pyd

                    Filesize

                    132KB

                    MD5

                    6831f1165a90a4306e7bb0306a8a55fb

                    SHA1

                    b540c17ae0ce3ed87a61bf17a38c81dfd599dff5

                    SHA256

                    cd462d674e68b08515fafce8c5d46f1c76f175f587c4e20336cf443e2f3eb131

                    SHA512

                    6ecd73dcb6e15abadac477e3cd087ef292258771f148e73624e7575ed973a9b3717b34791fa450af7e7e4a37e6f78bb98991bb4ee031cb44465379022232fa87

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\lxml\etree.cp310-win_amd64.pyd

                    Filesize

                    3.7MB

                    MD5

                    1db2e12163844aede3d2e667d82da2b6

                    SHA1

                    8c31facd670ff5abe2877960777b0cbf62d06eb8

                    SHA256

                    74376a6a48d2e081d71a000ac3e776ea11b721d5eb5680483853b09526c0a684

                    SHA512

                    2811fe04a1cc30016f06a463c54d87d326cb6a348caf107f51d6254ee08ef12d6e49c599799a38b3d9e0292e5c9d20c955f2c7406c5b7b87793f2e322e948403

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\lxml\etree.cp310-win_amd64.pyd

                    Filesize

                    3.7MB

                    MD5

                    1db2e12163844aede3d2e667d82da2b6

                    SHA1

                    8c31facd670ff5abe2877960777b0cbf62d06eb8

                    SHA256

                    74376a6a48d2e081d71a000ac3e776ea11b721d5eb5680483853b09526c0a684

                    SHA512

                    2811fe04a1cc30016f06a463c54d87d326cb6a348caf107f51d6254ee08ef12d6e49c599799a38b3d9e0292e5c9d20c955f2c7406c5b7b87793f2e322e948403

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\pyexpat.pyd

                    Filesize

                    189KB

                    MD5

                    8b9855e1b442b22984dc07a8c6d9d2ed

                    SHA1

                    2e708fbf1344731bca3c603763e409190c019d7f

                    SHA256

                    4d0f50757a4d9abe249bd7ebea35243d4897911a72de213ddb6c6945fef49e06

                    SHA512

                    59ca1cbc51a0b9857e921e769587b021bc3f157d8680bb8f7d7f99deb90405db92051e9be8891399379d918afc5d8cb36123297d748c5265ae0855613b277809

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\pyexpat.pyd

                    Filesize

                    189KB

                    MD5

                    8b9855e1b442b22984dc07a8c6d9d2ed

                    SHA1

                    2e708fbf1344731bca3c603763e409190c019d7f

                    SHA256

                    4d0f50757a4d9abe249bd7ebea35243d4897911a72de213ddb6c6945fef49e06

                    SHA512

                    59ca1cbc51a0b9857e921e769587b021bc3f157d8680bb8f7d7f99deb90405db92051e9be8891399379d918afc5d8cb36123297d748c5265ae0855613b277809

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\pyppeteer-1.0.2.dist-info\METADATA

                    Filesize

                    6KB

                    MD5

                    eb67e501b7358362d92574f831e184b4

                    SHA1

                    de0cc05c71ac4043ac7ffcaac5799ff287078ba8

                    SHA256

                    59994cce46bcc86b708f306561612cd4babb50a0274e69579b5669ef5cbdc2e5

                    SHA512

                    675158449002c8850edfb7cebd126d09f59ae8e1bb6a4618bb7e6abd22fcf13ac259f03b233732785392ac83e6b29feeff9e4f3412f23d55fc84642302cd9946

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\python310.dll

                    Filesize

                    4.2MB

                    MD5

                    a1185bef38fdba5e3fe6a71f93a9d142

                    SHA1

                    e2b40f5e518ad000002b239a84c153fdc35df4eb

                    SHA256

                    8d0bec69554317ccf1796c505d749d5c9f3be74ccbfce1d9e4d5fe64a536ae9e

                    SHA512

                    cb9baea9b483b9153efe2f453d6ac0f0846b140e465d07244f651c946900bfcd768a6b4c0c335ecebb45810bf08b7324501ea22b40cc7061b2f2bb98ed7897f4

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\python310.dll

                    Filesize

                    4.2MB

                    MD5

                    a1185bef38fdba5e3fe6a71f93a9d142

                    SHA1

                    e2b40f5e518ad000002b239a84c153fdc35df4eb

                    SHA256

                    8d0bec69554317ccf1796c505d749d5c9f3be74ccbfce1d9e4d5fe64a536ae9e

                    SHA512

                    cb9baea9b483b9153efe2f453d6ac0f0846b140e465d07244f651c946900bfcd768a6b4c0c335ecebb45810bf08b7324501ea22b40cc7061b2f2bb98ed7897f4

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\select.pyd

                    Filesize

                    25KB

                    MD5

                    63ede3c60ee921074647ec0278e6aa45

                    SHA1

                    a02c42d3849ad8c03ce60f2fd1797b1901441f26

                    SHA256

                    cb643556c2dcdb957137b25c8a33855067e0d07547e547587c9886238253bfe5

                    SHA512

                    d0babc48b0e470abdafad6205cc0824eec66dbb5bff771cee6d99a0577373a2de2ffab93e86c42c7642e49999a03546f94e7630d3c58db2cff8f26debc67fcad

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\select.pyd

                    Filesize

                    25KB

                    MD5

                    63ede3c60ee921074647ec0278e6aa45

                    SHA1

                    a02c42d3849ad8c03ce60f2fd1797b1901441f26

                    SHA256

                    cb643556c2dcdb957137b25c8a33855067e0d07547e547587c9886238253bfe5

                    SHA512

                    d0babc48b0e470abdafad6205cc0824eec66dbb5bff771cee6d99a0577373a2de2ffab93e86c42c7642e49999a03546f94e7630d3c58db2cff8f26debc67fcad

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\unicodedata.pyd

                    Filesize

                    1.1MB

                    MD5

                    d67ac58da9e60e5b7ef3745fdda74f7d

                    SHA1

                    092faa0a13f99fd05c63395ee8ee9aa2bb1ca478

                    SHA256

                    09e1d1e9190160959696aeddb0324667fef39f338edc28f49b5f518b92f27f5f

                    SHA512

                    9d510135e4106fef0640565e73d438b4398f7aa65a36e3ea21d8241f07fec7a23e721e8696b3605147e5ce5365684e84e8145001201a19d7537e8f61b20cf32c

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\unicodedata.pyd

                    Filesize

                    1.1MB

                    MD5

                    d67ac58da9e60e5b7ef3745fdda74f7d

                    SHA1

                    092faa0a13f99fd05c63395ee8ee9aa2bb1ca478

                    SHA256

                    09e1d1e9190160959696aeddb0324667fef39f338edc28f49b5f518b92f27f5f

                    SHA512

                    9d510135e4106fef0640565e73d438b4398f7aa65a36e3ea21d8241f07fec7a23e721e8696b3605147e5ce5365684e84e8145001201a19d7537e8f61b20cf32c

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\websockets\speedups.cp310-win_amd64.pyd

                    Filesize

                    12KB

                    MD5

                    5f1f993f603cf62cc62e447b27830e9e

                    SHA1

                    e70a6740f5a15a8cd0a095d74afd7ed4b2630b0a

                    SHA256

                    d029c1f0edc9a18c42d1fa272173804ea8049ed3ec23aeb8d846a9c0c9e9e3f4

                    SHA512

                    d6743b5b8473d3655fef091d65eeee0dd8f680a837f90570bdb05944065318a6e6ce314122084b80f67005a88660e4fb2cddb25a0d73bec0ad36ce5ae9e7716e

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\websockets\speedups.cp310-win_amd64.pyd

                    Filesize

                    12KB

                    MD5

                    5f1f993f603cf62cc62e447b27830e9e

                    SHA1

                    e70a6740f5a15a8cd0a095d74afd7ed4b2630b0a

                    SHA256

                    d029c1f0edc9a18c42d1fa272173804ea8049ed3ec23aeb8d846a9c0c9e9e3f4

                    SHA512

                    d6743b5b8473d3655fef091d65eeee0dd8f680a837f90570bdb05944065318a6e6ce314122084b80f67005a88660e4fb2cddb25a0d73bec0ad36ce5ae9e7716e

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\zope\interface\_zope_interface_coptimizations.cp310-win_amd64.pyd

                    Filesize

                    33KB

                    MD5

                    89956eda6c442b5ed681be8c293838c6

                    SHA1

                    a2349702b4ed7f6a669d227ff40da9cd07e6dd47

                    SHA256

                    b7ca9fb985b0d457394ef763de2a7254217db3ee18e1e010c2985c8e20044e6a

                    SHA512

                    455778bcca9bcbea9980303d92f77793ba83d94b3386aecb1f1b782760cf2c4f84638689822a09bbcce37206137b3d43acae4d97ded88797a07abdef0d6e47b0

                  • C:\Users\Admin\AppData\Local\Temp\_MEI11882\zope\interface\_zope_interface_coptimizations.cp310-win_amd64.pyd

                    Filesize

                    33KB

                    MD5

                    89956eda6c442b5ed681be8c293838c6

                    SHA1

                    a2349702b4ed7f6a669d227ff40da9cd07e6dd47

                    SHA256

                    b7ca9fb985b0d457394ef763de2a7254217db3ee18e1e010c2985c8e20044e6a

                    SHA512

                    455778bcca9bcbea9980303d92f77793ba83d94b3386aecb1f1b782760cf2c4f84638689822a09bbcce37206137b3d43acae4d97ded88797a07abdef0d6e47b0

                  • \??\c:\users\admin\appdata\local\temp\_mei11882\zope.event-4.5.0.dist-info\namespace_packages.txt

                    Filesize

                    5B

                    MD5

                    90b425bf5a228d74998925659a5e2ebb

                    SHA1

                    d46acb64805e065b682e8342a67c761ece153ea9

                    SHA256

                    429507be93b8c08b990de120298f2a642b43fad02e901d1f9ff7fabadce56fdf

                    SHA512

                    b0826bebfd6b27c30c5ac7c1bbb86935618dc9e41a893025439bf70b19f46eca1678a210831938e982189ab565d1f69766a8348d65d867b870a73ef05fb54b53

                  • \??\c:\users\admin\appdata\local\temp\_mei11882\zope.interface-5.4.0-py3.10.egg-info\PKG-INFO

                    Filesize

                    40KB

                    MD5

                    89406d3a5d3eb7e8d187316196aab463

                    SHA1

                    03722c34ba5b00ae9e85ee7e7b14a9b65a5dae63

                    SHA256

                    f511e8451b17eb7b0ea9b09ebb1ddcdae395694480c2473b430327d455d29cef

                    SHA512

                    a0a050524f44b54ffe196ce96d01cae82952311e47ef517f19cb8637b5121156bf22cd0c05a600916eb4f49081b5dc115f054768b5d527f3c6e9820b7e2fed61

                  • \??\c:\users\admin\appdata\local\temp\_mei11882\zope.interface-5.4.0-py3.10.egg-info\namespace_packages.txt

                    Filesize

                    5B

                    MD5

                    90b425bf5a228d74998925659a5e2ebb

                    SHA1

                    d46acb64805e065b682e8342a67c761ece153ea9

                    SHA256

                    429507be93b8c08b990de120298f2a642b43fad02e901d1f9ff7fabadce56fdf

                    SHA512

                    b0826bebfd6b27c30c5ac7c1bbb86935618dc9e41a893025439bf70b19f46eca1678a210831938e982189ab565d1f69766a8348d65d867b870a73ef05fb54b53

                  • memory/3748-268-0x00007FFD87420000-0x00007FFD87EE1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/3748-267-0x0000000000F90000-0x0000000000F9C000-memory.dmp

                    Filesize

                    48KB

                  • memory/3964-204-0x0000000005410000-0x0000000005550000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/3964-213-0x0000000006170000-0x000000000617E000-memory.dmp

                    Filesize

                    56KB

                  • memory/3964-214-0x0000000006370000-0x0000000006392000-memory.dmp

                    Filesize

                    136KB

                  • memory/3964-215-0x0000000007110000-0x0000000007176000-memory.dmp

                    Filesize

                    408KB

                  • memory/3964-216-0x0000000007220000-0x00000000072B2000-memory.dmp

                    Filesize

                    584KB

                  • memory/3964-217-0x0000000007870000-0x0000000007E14000-memory.dmp

                    Filesize

                    5.6MB

                  • memory/3964-218-0x0000000007430000-0x00000000074A6000-memory.dmp

                    Filesize

                    472KB

                  • memory/3964-219-0x0000000008270000-0x000000000832A000-memory.dmp

                    Filesize

                    744KB

                  • memory/3964-220-0x00000000084A0000-0x0000000008608000-memory.dmp

                    Filesize

                    1.4MB

                  • memory/3964-221-0x00000000081F0000-0x0000000008212000-memory.dmp

                    Filesize

                    136KB

                  • memory/3964-222-0x0000000008360000-0x0000000008374000-memory.dmp

                    Filesize

                    80KB

                  • memory/3964-223-0x00000000088A0000-0x00000000088F0000-memory.dmp

                    Filesize

                    320KB

                  • memory/3964-224-0x000000000C180000-0x000000000C188000-memory.dmp

                    Filesize

                    32KB

                  • memory/3964-225-0x000000000D0A0000-0x000000000D0A8000-memory.dmp

                    Filesize

                    32KB

                  • memory/3964-226-0x000000000D0D0000-0x000000000D0D8000-memory.dmp

                    Filesize

                    32KB

                  • memory/3964-227-0x000000000D920000-0x000000000D958000-memory.dmp

                    Filesize

                    224KB

                  • memory/3964-228-0x000000000D0C0000-0x000000000D0CE000-memory.dmp

                    Filesize

                    56KB

                  • memory/3964-229-0x0000000005870000-0x0000000005952000-memory.dmp

                    Filesize

                    904KB

                  • memory/3964-230-0x0000000005870000-0x0000000005952000-memory.dmp

                    Filesize

                    904KB

                  • memory/3964-211-0x0000000005950000-0x0000000005958000-memory.dmp

                    Filesize

                    32KB

                  • memory/3964-210-0x00000000057F0000-0x00000000057FE000-memory.dmp

                    Filesize

                    56KB

                  • memory/3964-209-0x0000000005D40000-0x0000000005DF0000-memory.dmp

                    Filesize

                    704KB

                  • memory/3964-208-0x00000000057C0000-0x00000000057E4000-memory.dmp

                    Filesize

                    144KB

                  • memory/3964-203-0x0000000000920000-0x0000000000988000-memory.dmp

                    Filesize

                    416KB

                  • memory/3964-205-0x0000000005800000-0x0000000005868000-memory.dmp

                    Filesize

                    416KB

                  • memory/3964-206-0x0000000005960000-0x0000000005A42000-memory.dmp

                    Filesize

                    904KB

                  • memory/3964-207-0x00000000053F0000-0x00000000053F8000-memory.dmp

                    Filesize

                    32KB

                  • memory/4032-242-0x000001BAD3BA0000-0x000001BAD3C82000-memory.dmp

                    Filesize

                    904KB

                  • memory/4032-257-0x000001BAD7140000-0x000001BAD7162000-memory.dmp

                    Filesize

                    136KB

                  • memory/4032-238-0x000001BAD20F0000-0x000001BAD2112000-memory.dmp

                    Filesize

                    136KB

                  • memory/4032-239-0x00007FFD87420000-0x00007FFD87EE1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4032-240-0x000001BAD2120000-0x000001BAD2158000-memory.dmp

                    Filesize

                    224KB

                  • memory/4032-236-0x000001BAD2080000-0x000001BAD20BC000-memory.dmp

                    Filesize

                    240KB

                  • memory/4032-241-0x000001BAB7D30000-0x000001BAB7D3A000-memory.dmp

                    Filesize

                    40KB

                  • memory/4032-243-0x000001BAB7D10000-0x000001BAB7D1E000-memory.dmp

                    Filesize

                    56KB

                  • memory/4032-244-0x000001BAB7DD0000-0x000001BAB7DD8000-memory.dmp

                    Filesize

                    32KB

                  • memory/4032-245-0x000001BAB96C0000-0x000001BAB96CE000-memory.dmp

                    Filesize

                    56KB

                  • memory/4032-246-0x000001BAD2160000-0x000001BAD2168000-memory.dmp

                    Filesize

                    32KB

                  • memory/4032-247-0x000001BAD3FD0000-0x000001BAD3FDE000-memory.dmp

                    Filesize

                    56KB

                  • memory/4032-248-0x000001BAD4070000-0x000001BAD4100000-memory.dmp

                    Filesize

                    576KB

                  • memory/4032-249-0x000001BAD41C0000-0x000001BAD427A000-memory.dmp

                    Filesize

                    744KB

                  • memory/4032-250-0x000001BAD4100000-0x000001BAD4138000-memory.dmp

                    Filesize

                    224KB

                  • memory/4032-251-0x000001BAD4040000-0x000001BAD404E000-memory.dmp

                    Filesize

                    56KB

                  • memory/4032-252-0x000001BAD41B0000-0x000001BAD41B8000-memory.dmp

                    Filesize

                    32KB

                  • memory/4032-253-0x000001BAD4180000-0x000001BAD41A4000-memory.dmp

                    Filesize

                    144KB

                  • memory/4032-255-0x000001BAD71A0000-0x000001BAD71FE000-memory.dmp

                    Filesize

                    376KB

                  • memory/4032-237-0x000001BAD20C0000-0x000001BAD20E8000-memory.dmp

                    Filesize

                    160KB

                  • memory/4032-256-0x000001BAD73A0000-0x000001BAD7508000-memory.dmp

                    Filesize

                    1.4MB

                  • memory/4032-254-0x000001BAD7120000-0x000001BAD713E000-memory.dmp

                    Filesize

                    120KB

                  • memory/4032-258-0x000001BAD7170000-0x000001BAD718E000-memory.dmp

                    Filesize

                    120KB

                  • memory/4032-260-0x000001BAD7200000-0x000001BAD721C000-memory.dmp

                    Filesize

                    112KB

                  • memory/4032-259-0x000001BAD7230000-0x000001BAD7252000-memory.dmp

                    Filesize

                    136KB

                  • memory/4032-262-0x000001BAD7260000-0x000001BAD7274000-memory.dmp

                    Filesize

                    80KB

                  • memory/4032-263-0x000001BAD72D0000-0x000001BAD7320000-memory.dmp

                    Filesize

                    320KB

                  • memory/4032-261-0x000001BAD7510000-0x000001BAD760C000-memory.dmp

                    Filesize

                    1008KB

                  • memory/4032-264-0x000001BAD7280000-0x000001BAD7292000-memory.dmp

                    Filesize

                    72KB

                  • memory/4032-265-0x00007FFD87420000-0x00007FFD87EE1000-memory.dmp

                    Filesize

                    10.8MB

                  • memory/4032-235-0x000001BAD3A00000-0x000001BAD3AB0000-memory.dmp

                    Filesize

                    704KB

                  • memory/4032-234-0x000001BAB7D40000-0x000001BAB7DA8000-memory.dmp

                    Filesize

                    416KB

                  • memory/4032-269-0x000001BAD1940000-0x000001BAD1A10000-memory.dmp

                    Filesize

                    832KB

                  • memory/4032-232-0x000001BAB7760000-0x000001BAB79D0000-memory.dmp

                    Filesize

                    2.4MB

                  • memory/4032-233-0x000001BAD21C0000-0x000001BAD2300000-memory.dmp

                    Filesize

                    1.2MB