Analysis

  • max time kernel
    124s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-04-2024 00:46

General

  • Target

    colorbot/aimsource.exe

  • Size

    54.8MB

  • MD5

    93e69cc53eb8c3d032f202b011c303cb

  • SHA1

    0cb7b7a76b79d5726b317a6578ea462899dd3fae

  • SHA256

    69cb1f25fbb76e6c9d80f08b51418480f712a471ce2ac67fdb8af82cf53cc1a6

  • SHA512

    741970015d29416a3e9b2506359df346c1ad5e530df8cca050a1870841f5113bc78154ea78b3fa281d123b6545a17381c2725f44e1ec2a4f7eeb54ac9ff9b056

  • SSDEEP

    1572864:CMFP/V4f6Gj53ikjt4jRq2GqFOPV5Yi22qHWB75iUHS5n:zt/VG6RmtCRlGPrw2qHO5in

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 34 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\colorbot\aimsource.exe
    "C:\Users\Admin\AppData\Local\Temp\colorbot\aimsource.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:400
    • C:\Users\Admin\AppData\Local\Temp\colorbot\aimsource.exe
      "C:\Users\Admin\AppData\Local\Temp\colorbot\aimsource.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4216
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "ver"
        3⤵
          PID:2508
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/nDREsRUj9V
          3⤵
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:4328
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff9c1fc46f8,0x7ff9c1fc4708,0x7ff9c1fc4718
            4⤵
              PID:3236
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,9122612296613660491,14287166396905231570,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1936 /prefetch:2
              4⤵
                PID:3292
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2008,9122612296613660491,14287166396905231570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2556 /prefetch:3
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:4672
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2008,9122612296613660491,14287166396905231570,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2968 /prefetch:8
                4⤵
                  PID:3632
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9122612296613660491,14287166396905231570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:1
                  4⤵
                    PID:1224
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9122612296613660491,14287166396905231570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:1
                    4⤵
                      PID:1128
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9122612296613660491,14287166396905231570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:1
                      4⤵
                        PID:4976
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2008,9122612296613660491,14287166396905231570,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=3664 /prefetch:8
                        4⤵
                          PID:816
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2008,9122612296613660491,14287166396905231570,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=3656 /prefetch:8
                          4⤵
                          • Modifies registry class
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3952
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,9122612296613660491,14287166396905231570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5840 /prefetch:8
                          4⤵
                            PID:556
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2008,9122612296613660491,14287166396905231570,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5840 /prefetch:8
                            4⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2508
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9122612296613660491,14287166396905231570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:1
                            4⤵
                              PID:2904
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9122612296613660491,14287166396905231570,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:1
                              4⤵
                                PID:2808
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9122612296613660491,14287166396905231570,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:1
                                4⤵
                                  PID:4764
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2008,9122612296613660491,14287166396905231570,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:1
                                  4⤵
                                    PID:3052
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2008,9122612296613660491,14287166396905231570,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:2
                                    4⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:4748
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c title Colorbot
                                  3⤵
                                    PID:1016
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c cls
                                    3⤵
                                      PID:2484
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:848
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:2332

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\08a3bb5e-6ece-486a-bc75-12a60758fcbd.tmp

                                      Filesize

                                      11KB

                                      MD5

                                      6c9a67ec4ce3bfdc83afc2976be7af02

                                      SHA1

                                      abb16d4bed70cf419dcfd95229c40190b5f0dfad

                                      SHA256

                                      6ce202dc54d27331cc2e1498f35ff03bd8070671b4b8abfe5d4d5eb7c5dc3ee7

                                      SHA512

                                      7c7a6bf6ff52e45f579e8b7c22849bb2c394c4d8cbddf3d74afaa2aca173e37d35f8bc369b504bb9beb411cfdb99dd2ffdb3c410c5c51fefd949841a8176e2f8

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      cb138796dbfb37877fcae3430bb1e2a7

                                      SHA1

                                      82bb82178c07530e42eca6caf3178d66527558bc

                                      SHA256

                                      50c55ba7baeebe1fa4573118edbca59010d659ea42761148618fb3af8a1c9bdd

                                      SHA512

                                      287471cccbe33e08015d6fc35e0bcdca0ec79bebc3a58f6a340b7747b5b2257b33651574bc83ed529aef2ba94be6e68968e59d2a8ef5f733dce9df6404ad7cc5

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      864B

                                      MD5

                                      bab13efb5e5cc0204715a4a7b19df066

                                      SHA1

                                      ee3ab6ced45cd02caacc18ecf35dde755e063ad9

                                      SHA256

                                      98fb8c6462ef101f6b386bc38bb4dfe4a13a8f869f1af22ce0f551be156d90ea

                                      SHA512

                                      f3a6eb1c3dd9f169227764071e403961e0484cb60c8a989af76ac97b632ea177ec0d133726e51abb4f7521e11e34b3c3e1ebd08016ab9ce688dbefd878550e84

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      537B

                                      MD5

                                      629560867c19c99cd593de1ba722ed77

                                      SHA1

                                      c49dde5de761f00654258a72cfce4ebd35077021

                                      SHA256

                                      c23d8dbe0c651b80368da21aafb5518c781836f7be9566215fcefaf98a86a3e6

                                      SHA512

                                      7dfba7f1a6e4e95afd4c99f081b8da6f9d50f0d6fc0fd0a1aad1f6f2fec1ca365b246f3d96d520d582ffd63904a58c0d3ee2b4aa681a226da872127bf0dbe368

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      554ff476c3bf69ae966a08258b5c5db1

                                      SHA1

                                      bbbccd0cfb32f67226fec297fd0b0cc4de82a7c0

                                      SHA256

                                      b93163e347dff6573a4af5ce4d35296d051a3c7e66dc99dd257757eca8494c9f

                                      SHA512

                                      b9f26d11821170b1090d4a9f77852a6338fe7d2aa5e9c24a83d2f2c584c6292d1c53ac7ec450d3290f4de6d3159bc591a973e711f44431084f07f751ea9c4074

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      5a5db809a3c31555bca3c793806d3657

                                      SHA1

                                      cdd648e4ac0752cce3567dca98810c25bcc40353

                                      SHA256

                                      ad0ce452b24ed878b4846508b55f6751e79adde38cc0693b2e57e9938cd7075a

                                      SHA512

                                      cc10715ff931424d3a76e0afa1d326e76b91e5142378f6dd7318f4f25702ccb9758478086890567db5e3f8d334782ab500fb248856177531676b41b35bf489df

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      6752a1d65b201c13b62ea44016eb221f

                                      SHA1

                                      58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                      SHA256

                                      0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                      SHA512

                                      9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      12KB

                                      MD5

                                      1341382658c91c9768ae3de49f4392ad

                                      SHA1

                                      5b3a5300f87d742c684e1a642339b7b373e1ed28

                                      SHA256

                                      1029b4d969d38228d76964ef495f3d2e73deb8b5509ec02dc8cb7a0c39485a9f

                                      SHA512

                                      e0ecebde8383a9ef46677733acd3dd78361a66b1d16b74e0a1c20412afdf6038c5d118d8644141c669143f8419546e7ac9ddd9aeb12e2c43fb943c4a76e15e5e

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\VCRUNTIME140.dll

                                      Filesize

                                      94KB

                                      MD5

                                      a87575e7cf8967e481241f13940ee4f7

                                      SHA1

                                      879098b8a353a39e16c79e6479195d43ce98629e

                                      SHA256

                                      ded5adaa94341e6c62aea03845762591666381dca30eb7c17261dd154121b83e

                                      SHA512

                                      e112f267ae4c9a592d0dd2a19b50187eb13e25f23ded74c2e6ccde458bcdaee99f4e3e0a00baf0e3362167ae7b7fe4f96ecbcd265cc584c1c3a4d1ac316e92f0

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\VCRUNTIME140_1.dll

                                      Filesize

                                      36KB

                                      MD5

                                      37c372da4b1adb96dc995ecb7e68e465

                                      SHA1

                                      6c1b6cb92ff76c40c77f86ea9a917a5f854397e2

                                      SHA256

                                      1554b5802968fdb2705a67cbb61585e9560b9e429d043a5aa742ef3c9bbfb6bf

                                      SHA512

                                      926f081b1678c15dc649d7e53bfbe98e4983c9ad6ccdf11c9383ca1d85f2a7353d5c52bebf867d6e155ff897f4702fc4da36a8f4cf76b00cb842152935e319a6

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\_asyncio.pyd

                                      Filesize

                                      64KB

                                      MD5

                                      c39fa3d657d1376e002901314c94e77f

                                      SHA1

                                      c2d4e593bf574b0cb10970d44fbd3edd1a39a3aa

                                      SHA256

                                      fbde7fb72842c392bd9282ddb65bb786fbc12d01aabf3dbce83ab2f7565f2964

                                      SHA512

                                      88f35ef78e513c71615af09efa9772f6f9ecaeece8ca8eaa99c591ffdb7e4af7bb181e89c3ccffd1538766b64e440017431c664b40a0b8766c3e6120cfa626fa

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\_bz2.pyd

                                      Filesize

                                      85KB

                                      MD5

                                      c013236b137b64ff2f30dc0c2af56084

                                      SHA1

                                      3d600c348794b3116c0d3230a40672be350142f7

                                      SHA256

                                      c435022d2cc868e26cde10e7749862ee8a177fced3289d49c3bc33af0c949d3f

                                      SHA512

                                      8fc14cafc32331af3f04257ea38d562d419c2c8c89ccaa8ace51593e708ec9cb27d9e1bd241bc717f929bd2d8c68aa78824af6b5adf1bde0e25812ec4de15852

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\_ctypes.pyd

                                      Filesize

                                      124KB

                                      MD5

                                      22cf43eaca1f0745896ccd7e8910f9e4

                                      SHA1

                                      3df4d9f7386a044943fdcea6665acc0a13ed9fce

                                      SHA256

                                      aaf9f6487b618aeb15dfe7d77b3f0d58185718fd68631323e56392ddef1d000f

                                      SHA512

                                      2e6d1cfabda0f617cd3acef0a9255e4c56868e66a7545a36f2da441ea27a40a45450887a48e0164a542fec1d6ae59f2933c2b6d95a4ea5cf4d2c249a3e886e10

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\_decimal.pyd

                                      Filesize

                                      264KB

                                      MD5

                                      ea868d77edd4fa3281048fdd45d5cdf4

                                      SHA1

                                      e2617e46596a437e96f259a0d46323ff392eb6c9

                                      SHA256

                                      a3b5f473bdf602442444de670b30d768e202b268209774d40c172eba4e226624

                                      SHA512

                                      3568c1d3831cbcdee5b8e2fb35833e794b82ea23762bdedee579591235ba3ef28747dcbf8cf35d802ba936570da0a956b80f3913cc9fd5273d9068ae0610f727

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\_hashlib.pyd

                                      Filesize

                                      63KB

                                      MD5

                                      96bdc361b3127f01eefbf0b54dc2813a

                                      SHA1

                                      f5900e228f6ccd1fe44a99a23cd27e6a71d2d88b

                                      SHA256

                                      95760d2f49b695cb0dc03720e2cdce34d1215285023f2bb7690f268e434c7871

                                      SHA512

                                      6a9a481d130eef5a98b5d2b40ddca1d7aa83d7abb255368f3fdca85c395b0cd0711765143a6ec8f14696599cfd4876375449272f013969a59e7f26618a730b36

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\_lzma.pyd

                                      Filesize

                                      159KB

                                      MD5

                                      ecd60b380b7875d2521739e7acf365fc

                                      SHA1

                                      487ffde1f1a31f321a87658d22a1763624600304

                                      SHA256

                                      1dcb9689a2a3eb1c2554caec217d4f6a10cf677701bcb6f762d6cc2111d14c4a

                                      SHA512

                                      37db64611f7098c08089b17a88db638ec329fa2b652689a3a7509566110afe8eca3ac5e047530d628503d713e15584ad376631576fa9d3e9efb4a1ca0c3c1709

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\_multiprocessing.pyd

                                      Filesize

                                      30KB

                                      MD5

                                      484a580ca0398ae225eefe012738687e

                                      SHA1

                                      e1dfe5f2da99e890290fee74e9332697f5b80ce5

                                      SHA256

                                      cb1f313de6b1c6f152091b5044554c453de6378dc2eac17171ba4a262e30711f

                                      SHA512

                                      62ce6cc12b8a35ad3f7e83f71667e0290db5dbc66ded78fccfb2c2dedcf09d733489d779f892718f78746d0551a13a71687f07a42bef0cf45b9fa4dd0504943e

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\_overlapped.pyd

                                      Filesize

                                      45KB

                                      MD5

                                      565a3f09c8372725cb22ee89df38cb6e

                                      SHA1

                                      5f362a65096d1d3f000ebf08653dff328c154a44

                                      SHA256

                                      0b561d24933409fe061cb924739f7a677c7153ae66cd7dc242ef1ffbe334274c

                                      SHA512

                                      f09e9813a1676167dff38430aaf7e7d689d5271874147bb3dde5d4c66dbd3e417f24df065b74c721d31ff0c859da6487878e1fea95d26bd62a221e684d72e178

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\_queue.pyd

                                      Filesize

                                      29KB

                                      MD5

                                      aac0035f5b5868a3e92df59f19e00773

                                      SHA1

                                      b3215c188385010af8519af0a66b9075644c4760

                                      SHA256

                                      1ff1c01be25fd6797b263474c1c8df45107796a7e4d465e32a908d572d647b64

                                      SHA512

                                      a65975f3a1af79653a728aea801bc79de2274efcb5965f6433856c80f5584d16b46e339268068a3d5ca93216f0f3d81c7e79ac5a4eef2928dfeae0ed156d0b15

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\_socket.pyd

                                      Filesize

                                      78KB

                                      MD5

                                      ac90b2535025c3d2d88632591b619b73

                                      SHA1

                                      eee7a2803412a7bb362bd64cba378cfb5808d42b

                                      SHA256

                                      ed1d6e0aa8237e491dde3c3fdfa6f4df35585eadf4716473f98aa86aa0a910d9

                                      SHA512

                                      5fa573e3e2f712925cfc48ec5809493ef43db5c6694d2e244bebe6b9d2ceecfa5979619730321fd2a88ad59bbd5eb2b70672045e5062748ecd53fd216d116202

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\_ssl.pyd

                                      Filesize

                                      152KB

                                      MD5

                                      e7d8bbca8b419f220c8cd81b285cb4ae

                                      SHA1

                                      c83d4e44704d46ddafb186526666bcf37aa927ea

                                      SHA256

                                      5e54983cb975784a358b2a02738d9db1296e0ab7aee1503277d3fdd8cf43e41c

                                      SHA512

                                      628107783757d52efdedd0a13ecbc9ef4c6422916104716c7dcb62bcb5beb735ca30ff990dee2916f752c4a643438c464cd6f5fb63c1366060a8b9ec52c45dbd

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\base_library.zip

                                      Filesize

                                      828KB

                                      MD5

                                      73f8d61df85d3de5e66fa75499eb528a

                                      SHA1

                                      51ea08db8c3a4a36e7a83b7f2e2518d9cecf066a

                                      SHA256

                                      4f200ebb2c5fc088feb3b63b4a3e598aacaab70e7ac318ede54343a5d65ac01e

                                      SHA512

                                      72f19ebcd336a5358b4d32271881ce66542651c492fe94b4027a46927c4a2bfb00796a4f2bbb6fa924a943ca1cc51d82febf4ecd0b0caa978932e3b468703490

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\cv2\__init__.py

                                      Filesize

                                      6KB

                                      MD5

                                      eab99b31f1fd18e46e6e081ba3b5c06e

                                      SHA1

                                      9ca76b1097d58ef9c652aebfbeff32bfec17b25b

                                      SHA256

                                      b05b8000c71987cd4df824c1ed134b7fcd34617665e437b1aaec128f93d7f1c3

                                      SHA512

                                      7c4ea4a28f7876249b503155187bd59bcd9cf18a80264c8892e59e9fd7f3d461c91afc4c3c177dba48e1dfdd0feb5705b54b504f7daa886a2a0b72fddd1e80fc

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\keybinds.py

                                      Filesize

                                      4KB

                                      MD5

                                      ba6b93f22777b6c4794bb439cd839362

                                      SHA1

                                      7a02b68c839c53daff04255ee92db415e9034c66

                                      SHA256

                                      bc9548e307afd456096da0291bde060f01f2684794ed4c4af8449341dc02ee6d

                                      SHA512

                                      7cd85465675025e30c35e0d8b850891a31b23114bfa4fb3b75a5ee6d405916de299f92c9d22fbad67dfd5e7aea45545d64b685f7e0824e4b84839e010e7d510b

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\libcrypto-1_1.dll

                                      Filesize

                                      3.3MB

                                      MD5

                                      63c756d74c729d6d24da2b8ef596a391

                                      SHA1

                                      7610bb1cbf7a7fdb2246be55d8601af5f1e28a00

                                      SHA256

                                      17d0f4c13c213d261427ee186545b13ef0c67a99fe7ad12cd4d7c9ec83034ac8

                                      SHA512

                                      d9cf045bb1b6379dd44f49405cb34acf8570aed88b684d0ab83af571d43a0d8df46d43460d3229098bd767dd6e0ef1d8d48bc90b9040a43b5469cef7177416a2

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\libffi-7.dll

                                      Filesize

                                      32KB

                                      MD5

                                      eef7981412be8ea459064d3090f4b3aa

                                      SHA1

                                      c60da4830ce27afc234b3c3014c583f7f0a5a925

                                      SHA256

                                      f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

                                      SHA512

                                      dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\libssl-1_1.dll

                                      Filesize

                                      681KB

                                      MD5

                                      86556da811797c5e168135360acac6f2

                                      SHA1

                                      42d868fc25c490db60030ef77fba768374e7fe03

                                      SHA256

                                      a594fc6fa4851b3095279f6dc668272ee975e7e03b850da4945f49578abe48cb

                                      SHA512

                                      4ba4d6bfff563a3f9c139393da05321db160f5ae8340e17b82f46bcaf30cbcc828b2fc4a4f86080e4826f0048355118ef21a533def5e4c9d2496b98951344690

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\numpy.libs\libopenblas64__v0.3.23-293-gc2f4bdbb-gcc_10_3_0-2bde3a66a51006b2b53eb373ff767a3f.dll

                                      Filesize

                                      36.4MB

                                      MD5

                                      5e46c3d334c90c3029eb6ae2a3fe58f2

                                      SHA1

                                      ad3d806f720289ccb90ce8bfd0da49fa99e7777b

                                      SHA256

                                      57b87772bf676b5c2d718c79dddc9f039d79ec3319fee1398cc305adff7b69e5

                                      SHA512

                                      4bd29d19b619076a64a928f3871edcce8416bcf100c1aa1250932479d6536d9497f2f9a2668c90b3479d0d4ab4234ffa06f81bc6b107fad1be5097fa2b60ab28

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\numpy\core\_multiarray_tests.cp39-win_amd64.pyd

                                      Filesize

                                      63KB

                                      MD5

                                      46a229f9c54c0f0211325dcc3826aca9

                                      SHA1

                                      e746610ba4dad9cc9e731655104fa5b017ced543

                                      SHA256

                                      7dff04e2a5bf5ea15535b897db792bf3b7ad1591fea919c15b4e9dbd4c5f67c6

                                      SHA512

                                      21dcb83213802082fd266e7634dfe5933def4bdf964b32c8769b75063af763d9db0000b7ed34327d9d3b46572bde70492d6000e2380849436878f37646bc2bcc

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\numpy\core\_multiarray_umath.cp39-win_amd64.pyd

                                      Filesize

                                      2.7MB

                                      MD5

                                      f5604fe675f54e081a2e522461371670

                                      SHA1

                                      5430bd0fe7ab9abab2ba657a603485a105c325d4

                                      SHA256

                                      174fa7b850775f0224764bb754d4c0ca5515885480aac14a08a2ea8c305aac16

                                      SHA512

                                      584c7f8510384e8095afc3008a84da38fc3ada4de4e8cbf14f1a6eb83b2180edbae1353a8bcc249dc89f6c5516c84b1ea8dd5f8fc8ac91bbf95628f4077837b7

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\numpy\fft\_pocketfft_internal.cp39-win_amd64.pyd

                                      Filesize

                                      107KB

                                      MD5

                                      715be8257d3d4717f0fccd54b04e8563

                                      SHA1

                                      988f23ad08647713a1c7d08eb55d00bf35d9e647

                                      SHA256

                                      2f2049f9ee05aecdfc59be6ef059c5f97b2b6bdebe5e27fdd431ad67f788d8d7

                                      SHA512

                                      5973a365c5c8ed35f1aa5ccd06fb2a346092c8d97544fd31ca80c7f9f1b2c0c057f5661c676e69d50a2609b1dc5b98344d16fa2f6a24fb1ca8fc76c553b5fb4c

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\numpy\linalg\_umath_linalg.cp39-win_amd64.pyd

                                      Filesize

                                      104KB

                                      MD5

                                      db7697c1626d30e98eabf9822fb8a088

                                      SHA1

                                      35aae7bb6f45546006d9eeb6b482fc115b8cbc2f

                                      SHA256

                                      3327e82005d1259bbece28122c75a4e83bb508ee0cd62114adc285f21ae89365

                                      SHA512

                                      bc4b9a0114bac52f19ca3ba1261b1a95553fe21899aaf51f0d63d4383eef8fd8979f8ab697d384117d170a2eec4d75aa8ba6aa313d82a3875c32f2b00a0f820d

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\numpy\random\_bounded_integers.cp39-win_amd64.pyd

                                      Filesize

                                      251KB

                                      MD5

                                      bdd5db8721c48df94b9d7211f8acc5f8

                                      SHA1

                                      314da2c2978f43840f641fd6274177e4b0af9047

                                      SHA256

                                      1d5c98f95abc2c87533237b1200e14539b7c5d8f1bf90870c15cfc00d51097ff

                                      SHA512

                                      29874cda6595bd908c54a67c43bb8ad7b0d17ba1895650605d42b580a573395bfd4bf49453396ae131f192d2ab92627cf67667be19573fa6d79a39401c173033

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\numpy\random\_common.cp39-win_amd64.pyd

                                      Filesize

                                      170KB

                                      MD5

                                      075b073473a9529d0dbc2cbac637ce09

                                      SHA1

                                      903e1768a7a943a4fcfc122dc903f21ecd86c0e3

                                      SHA256

                                      48bf0e11f32dc18d4ae4bba02f952a21a167573326ae6da1a87dddd9349ec86c

                                      SHA512

                                      a8c2fb6e976ec26a11d5e2e1d23f1df59ffb71b7f5ae3983382ccee9bf256622c5ff27938fb5db4780e5be26f4ee2c749ffb8da594c84990581a54d4b68d961d

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\numpy\random\_generator.cp39-win_amd64.pyd

                                      Filesize

                                      678KB

                                      MD5

                                      f193fdafa9db9a528b12edad61cc6e00

                                      SHA1

                                      8a9c7e78035f864102a3d84886d107539b3baefc

                                      SHA256

                                      99f57f0ec077f5cf3aef47aa2ef5291964f74be5d73851f63c7fd15b87c31cbe

                                      SHA512

                                      a8e317a120481d84d123283d68ed25b181e3baf5708a90c1980b53444419da30a305122b817a3a05ec5305676010884c54dca4103b82b4ca91d0eb83f38d724d

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\numpy\random\_mt19937.cp39-win_amd64.pyd

                                      Filesize

                                      75KB

                                      MD5

                                      b15e49985a36102a282f4655d2115de2

                                      SHA1

                                      5cc2bf51e40738dabdfff5384c44398101777dca

                                      SHA256

                                      b7b81ef1df9952651c3473fd7d640d79b0524192050ae9bb8e2ab71e8eed3212

                                      SHA512

                                      30a1bc3d4fa27a5fda2fc4dde71f9a545a690bad1fd66c417c13e48918597f0e0daca88ca4a301b11457ca47746851fb70d2635c67722777baac0505ddcec864

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\numpy\random\_pcg64.cp39-win_amd64.pyd

                                      Filesize

                                      82KB

                                      MD5

                                      c2a8002bf0aa62e0bfe0f1e938a12ef6

                                      SHA1

                                      ad15a572d51f628757f227f881e004052a93a193

                                      SHA256

                                      c67705d6d3843a3656a8cd6eedac62c2b4209d3f801a92f3b2b5000a75600b8a

                                      SHA512

                                      b3fbd58cae741c00a14ad630ffacda5fa9f74bf6e558a7e8ecdd7418a131f7f615220db042bb55939e7cf754fa9cb6ad4ca19f8b7da39fd64f507b22e90d5907

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\numpy\random\_philox.cp39-win_amd64.pyd

                                      Filesize

                                      69KB

                                      MD5

                                      18e0b9676b9724a3931491828966beb2

                                      SHA1

                                      0c8846dfdb2900268009042dd53dff90570096d0

                                      SHA256

                                      73e35656e4e26137f771fddadb1b7a806fa8399bfa8abb66b63e1a9ede809d18

                                      SHA512

                                      5e4dcba88657bc099ac6bd43c46fbd88aef42e8f7ec3698cfb8334ffc46e5f12d0b74b2e8b00297a8f2fb943accf123debbea384cb4da8cedaa3c764de86b49e

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\numpy\random\_sfc64.cp39-win_amd64.pyd

                                      Filesize

                                      50KB

                                      MD5

                                      eeecd86be89a4944a7fc0569f31a48ec

                                      SHA1

                                      572f70eca1fb29d9b12cc4bb3278309d0dd3aabc

                                      SHA256

                                      5f778438d9bfc32b4ad3cb0ef7182af098504a081aa5e17db077cf424dae8d42

                                      SHA512

                                      3f3566734d6bd057231253b026b41dc3ae8f6ea579ee54a58c18d1ad66f8cddbc3785c3a234ffa5f5cb9d3e1ca4efad1cb8b9728c4e3473dace0f00b68033d09

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\numpy\random\bit_generator.cp39-win_amd64.pyd

                                      Filesize

                                      160KB

                                      MD5

                                      b2879af0ec91b94458e85c03c441cd14

                                      SHA1

                                      d8431b9e52277dd768666a7a20e4c5217362a980

                                      SHA256

                                      8b7b29f63f051f93ab7be369e7fd22cab1385e3aaa83d7beb3267df4f39154ab

                                      SHA512

                                      3dbce2b102e2a7ad62881ff24d2446ab25dc760bd5c1af8ee8780d08a94270d55b5754d99fcea1e5fbf885d3789a7983177e91ba132edffb38274b6f45298247

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\numpy\random\mtrand.cp39-win_amd64.pyd

                                      Filesize

                                      583KB

                                      MD5

                                      12c6aab00309d50d5ff5e7b6877f83d6

                                      SHA1

                                      d53b321b496ff637643570a948a7238a3098be9c

                                      SHA256

                                      f2206738b19668bc5718d0e684890ab9a6d420aac35d5c784d4cc35a6d520493

                                      SHA512

                                      564e75b86af8ed3fccec51f85ad5442b5b68ee70393126a61f0ff174d1d0165e427e413f8b02724dcf748a4bdfa3f1b58a5d1fbf2adbd066be690471daa10673

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\pyexpat.pyd

                                      Filesize

                                      199KB

                                      MD5

                                      34ea1b1c7d3a9effda3a485d21abade3

                                      SHA1

                                      6fb594c0c73e02b5f89b019f188c4ca69ba5dcb1

                                      SHA256

                                      215614c89aed025166d3434252bd914ea2ac5af0762d2dd01ed4f4966d9ed711

                                      SHA512

                                      8874be2826e0d3a94e9fb400438bf9b0197ff47eff4e7af3a643934c6e56905b658acf23fbf088be0926700723bce62125c418ca927d41c2935bdff8b3ca912c

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\python3.DLL

                                      Filesize

                                      58KB

                                      MD5

                                      2ddd2ee635db86575c416f075c41ac8c

                                      SHA1

                                      99d03f524823059066995181ba21be29d90f2488

                                      SHA256

                                      be0b573bc6f005235354c246e1f9f626793687f50ad632feb2e767398f414fe3

                                      SHA512

                                      b84d4b3ca1298897cfafe195394ec6fdb51ed42ce0ca9ea0ab60dc2a8c31b2c865c4cc4fe0df3ffe1c813d21ca6013661e0cb83a91614472c7f6e3a7c78c1f06

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\python39.dll

                                      Filesize

                                      4.3MB

                                      MD5

                                      5871ae2a45d675ed9dd077c400018c30

                                      SHA1

                                      ddc03af9d433c3dfad8a193c50695139c59b4b58

                                      SHA256

                                      5d0ff879174faec03eb173eb2088f2e7519f4663dd6bfe5b817ec602c389ae20

                                      SHA512

                                      d87a90dbf42c528bc3fa038eb83d4318d2e8577a590bf9c84641c573b5b2fea83aac91bb108968252e07497424ed85f519a864e955f94a7f8e87bfc38e0f4b7b

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\select.pyd

                                      Filesize

                                      28KB

                                      MD5

                                      0906200f02e2ee5eb3da08a64f10a69e

                                      SHA1

                                      5afcb2cc53a6d8ca85d1fe51389632b8b84d5194

                                      SHA256

                                      fb4fa3aed7a7955d4f78a3fbc2a6e6e1ab8d9e3768bb8b3f3a85866d1f2d74d5

                                      SHA512

                                      b69e9f7fdd77f776acd056cc8a2d8b34da76e1f30a50117b9aa6bf467a9ce7178407fc6b5e2126c0eea6f995ffa8ae94f92e0632c566fc39bab29ff278193cbc

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI4002\unicodedata.pyd

                                      Filesize

                                      1.1MB

                                      MD5

                                      814d6938da8e46d79b64326aa967a1a0

                                      SHA1

                                      6d020c9ca51d7d4e77c197f5394d7e157482cea3

                                      SHA256

                                      4059acb95b05b4536c983ebd232dc5aec00828914e61f31674b0fdf41656deb6

                                      SHA512

                                      f286b6e813bcd3ee9aad25f804689e3e8bbe13a41bb5715e49bcc1dc7ccae2f0c7595dbaabad806fea65825952e5e31d32ac9b31e583bf4b7cdf716ae6fa08d1

                                    • memory/4216-139-0x000001BDFD1A0000-0x000001BDFD1A1000-memory.dmp

                                      Filesize

                                      4KB

                                    • memory/4216-234-0x00007FF9B0410000-0x00007FF9B24C6000-memory.dmp

                                      Filesize

                                      32.7MB

                                    • memory/4216-270-0x000001BDFD1A0000-0x000001BDFD1A1000-memory.dmp

                                      Filesize

                                      4KB