Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-05-2024 07:36

General

  • Target

    colorbot/aimsource.exe

  • Size

    54.8MB

  • MD5

    93e69cc53eb8c3d032f202b011c303cb

  • SHA1

    0cb7b7a76b79d5726b317a6578ea462899dd3fae

  • SHA256

    69cb1f25fbb76e6c9d80f08b51418480f712a471ce2ac67fdb8af82cf53cc1a6

  • SHA512

    741970015d29416a3e9b2506359df346c1ad5e530df8cca050a1870841f5113bc78154ea78b3fa281d123b6545a17381c2725f44e1ec2a4f7eeb54ac9ff9b056

  • SSDEEP

    1572864:CMFP/V4f6Gj53ikjt4jRq2GqFOPV5Yi22qHWB75iUHS5n:zt/VG6RmtCRlGPrw2qHO5in

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 33 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\colorbot\aimsource.exe
    "C:\Users\Admin\AppData\Local\Temp\colorbot\aimsource.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1312
    • C:\Users\Admin\AppData\Local\Temp\colorbot\aimsource.exe
      "C:\Users\Admin\AppData\Local\Temp\colorbot\aimsource.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:624
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "ver"
        3⤵
          PID:3540
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://discord.gg/nDREsRUj9V
          3⤵
          • Enumerates system info in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          • Suspicious use of WriteProcessMemory
          PID:780
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffee6f446f8,0x7ffee6f44708,0x7ffee6f44718
            4⤵
              PID:4436
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,10649382068991048783,3088786464388477411,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:2
              4⤵
                PID:3128
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,10649382068991048783,3088786464388477411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:3
                4⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:3448
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,10649382068991048783,3088786464388477411,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:8
                4⤵
                  PID:1280
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10649382068991048783,3088786464388477411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:1
                  4⤵
                    PID:2768
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10649382068991048783,3088786464388477411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:1
                    4⤵
                      PID:2272
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10649382068991048783,3088786464388477411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:1
                      4⤵
                        PID:700
                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=2120,10649382068991048783,3088786464388477411,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5276 /prefetch:8
                        4⤵
                          PID:1344
                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=2120,10649382068991048783,3088786464388477411,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5288 /prefetch:8
                          4⤵
                          • Modifies registry class
                          • Suspicious behavior: EnumeratesProcesses
                          PID:3320
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,10649382068991048783,3088786464388477411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:8
                          4⤵
                            PID:1844
                          • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,10649382068991048783,3088786464388477411,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5864 /prefetch:8
                            4⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:1680
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10649382068991048783,3088786464388477411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3716 /prefetch:1
                            4⤵
                              PID:4148
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10649382068991048783,3088786464388477411,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:1
                              4⤵
                                PID:5064
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10649382068991048783,3088786464388477411,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:1
                                4⤵
                                  PID:1800
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,10649382068991048783,3088786464388477411,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:1
                                  4⤵
                                    PID:1104
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,10649382068991048783,3088786464388477411,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2616 /prefetch:2
                                    4⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:672
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c title Colorbot
                                  3⤵
                                    PID:3140
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c cls
                                    3⤵
                                      PID:4692
                                • C:\Windows\System32\CompPkgSrv.exe
                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                  1⤵
                                    PID:3556
                                  • C:\Windows\System32\CompPkgSrv.exe
                                    C:\Windows\System32\CompPkgSrv.exe -Embedding
                                    1⤵
                                      PID:3708

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      4158365912175436289496136e7912c2

                                      SHA1

                                      813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59

                                      SHA256

                                      354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1

                                      SHA512

                                      74b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                      Filesize

                                      152B

                                      MD5

                                      ce4c898f8fc7601e2fbc252fdadb5115

                                      SHA1

                                      01bf06badc5da353e539c7c07527d30dccc55a91

                                      SHA256

                                      bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa

                                      SHA512

                                      80fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index

                                      Filesize

                                      840B

                                      MD5

                                      31a6dbe4a34b27440f160cdf8f776273

                                      SHA1

                                      866d155b482c1c7393f79ce9b459663ca97b04be

                                      SHA256

                                      6621e5140d034b63ef8670a8f0f25638c5938fcbf29a2d3bbc0852e4c5c6c06b

                                      SHA512

                                      c94e851322cc6bb71c0e44fa624c83d0f0ec9d6c2b6124852659a838c2a4413f4ce943daabd21f7ba40909319958eec60e36981efcd9e1f8f17329b101e07b10

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State

                                      Filesize

                                      537B

                                      MD5

                                      0b0fc6f468482fb4b71dbdbf303d0e67

                                      SHA1

                                      ec78e3957be0cf4a9a38bb857365d033a70cee41

                                      SHA256

                                      def5c66681526d0d38cf1ecf3b9c6370fb1868626efac93c721f5e28445900a2

                                      SHA512

                                      83c7e61006be740e3cdf8d109e9e590dea7d927dbb8314e9456828934ebdb3be6a828045556d6c2c3ff13f8a833e2c7c2efd1e07e5b22e8733a65fcfc4b07263

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      4885d6035d83ef42b3f7a23c104f519b

                                      SHA1

                                      cbec08ac9176c93da70ffbc2279d221f668323cd

                                      SHA256

                                      76b0097533976fdd2d4d64fd58b02330fdd7d43748b6b1670705a4fdd1d80597

                                      SHA512

                                      443ebdd903c301332ff0f6ee6451c749c5339eb7bbe8181f8d9420dab287e4515ed6f83501e2b9764bb2cd77d4d4e85a92bd42d7465f88b15ccf94dc8d07d89c

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                      Filesize

                                      6KB

                                      MD5

                                      6ab361b28b2414a502e60dcb73fbc4e5

                                      SHA1

                                      cd1c906fbe39d7a29794af6ad5a0774e3f06d75d

                                      SHA256

                                      43c1a624c273c0acee009691b90660b9ec3bce9c94f76aa9247f93e316eed260

                                      SHA512

                                      8f513f5e7d645c41bc5c02730c00b7da3c889a75040505f82bd1eade806d6b21fb2bef13a09de4976fe34b3139fb08226484b1e5793788e59162e06330dfd45a

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      206702161f94c5cd39fadd03f4014d98

                                      SHA1

                                      bd8bfc144fb5326d21bd1531523d9fb50e1b600a

                                      SHA256

                                      1005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167

                                      SHA512

                                      0af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                      Filesize

                                      16B

                                      MD5

                                      46295cac801e5d4857d09837238a6394

                                      SHA1

                                      44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                      SHA256

                                      0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                      SHA512

                                      8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                    • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                      Filesize

                                      11KB

                                      MD5

                                      61e34c4756c30f9973c69959f8a701f6

                                      SHA1

                                      af8f6375e5376ee4ccd9a15139aa7c69e6b6ed98

                                      SHA256

                                      7ade4c866f7f57837c208eb5287c218638543c7d3111ffd783b36d4da69339e4

                                      SHA512

                                      d710f88515343b38b5614381dc4b2d658d1da76dd013d5caf545b166a0c8f58b64b5ed7bb02549d2e80beebce0f30a731e265e437d983d92030c2aa863804ecf

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\VCRUNTIME140.dll

                                      Filesize

                                      94KB

                                      MD5

                                      a87575e7cf8967e481241f13940ee4f7

                                      SHA1

                                      879098b8a353a39e16c79e6479195d43ce98629e

                                      SHA256

                                      ded5adaa94341e6c62aea03845762591666381dca30eb7c17261dd154121b83e

                                      SHA512

                                      e112f267ae4c9a592d0dd2a19b50187eb13e25f23ded74c2e6ccde458bcdaee99f4e3e0a00baf0e3362167ae7b7fe4f96ecbcd265cc584c1c3a4d1ac316e92f0

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\VCRUNTIME140_1.dll

                                      Filesize

                                      36KB

                                      MD5

                                      37c372da4b1adb96dc995ecb7e68e465

                                      SHA1

                                      6c1b6cb92ff76c40c77f86ea9a917a5f854397e2

                                      SHA256

                                      1554b5802968fdb2705a67cbb61585e9560b9e429d043a5aa742ef3c9bbfb6bf

                                      SHA512

                                      926f081b1678c15dc649d7e53bfbe98e4983c9ad6ccdf11c9383ca1d85f2a7353d5c52bebf867d6e155ff897f4702fc4da36a8f4cf76b00cb842152935e319a6

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\_asyncio.pyd

                                      Filesize

                                      64KB

                                      MD5

                                      c39fa3d657d1376e002901314c94e77f

                                      SHA1

                                      c2d4e593bf574b0cb10970d44fbd3edd1a39a3aa

                                      SHA256

                                      fbde7fb72842c392bd9282ddb65bb786fbc12d01aabf3dbce83ab2f7565f2964

                                      SHA512

                                      88f35ef78e513c71615af09efa9772f6f9ecaeece8ca8eaa99c591ffdb7e4af7bb181e89c3ccffd1538766b64e440017431c664b40a0b8766c3e6120cfa626fa

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\_bz2.pyd

                                      Filesize

                                      85KB

                                      MD5

                                      c013236b137b64ff2f30dc0c2af56084

                                      SHA1

                                      3d600c348794b3116c0d3230a40672be350142f7

                                      SHA256

                                      c435022d2cc868e26cde10e7749862ee8a177fced3289d49c3bc33af0c949d3f

                                      SHA512

                                      8fc14cafc32331af3f04257ea38d562d419c2c8c89ccaa8ace51593e708ec9cb27d9e1bd241bc717f929bd2d8c68aa78824af6b5adf1bde0e25812ec4de15852

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\_ctypes.pyd

                                      Filesize

                                      124KB

                                      MD5

                                      22cf43eaca1f0745896ccd7e8910f9e4

                                      SHA1

                                      3df4d9f7386a044943fdcea6665acc0a13ed9fce

                                      SHA256

                                      aaf9f6487b618aeb15dfe7d77b3f0d58185718fd68631323e56392ddef1d000f

                                      SHA512

                                      2e6d1cfabda0f617cd3acef0a9255e4c56868e66a7545a36f2da441ea27a40a45450887a48e0164a542fec1d6ae59f2933c2b6d95a4ea5cf4d2c249a3e886e10

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\_decimal.pyd

                                      Filesize

                                      264KB

                                      MD5

                                      ea868d77edd4fa3281048fdd45d5cdf4

                                      SHA1

                                      e2617e46596a437e96f259a0d46323ff392eb6c9

                                      SHA256

                                      a3b5f473bdf602442444de670b30d768e202b268209774d40c172eba4e226624

                                      SHA512

                                      3568c1d3831cbcdee5b8e2fb35833e794b82ea23762bdedee579591235ba3ef28747dcbf8cf35d802ba936570da0a956b80f3913cc9fd5273d9068ae0610f727

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\_hashlib.pyd

                                      Filesize

                                      63KB

                                      MD5

                                      96bdc361b3127f01eefbf0b54dc2813a

                                      SHA1

                                      f5900e228f6ccd1fe44a99a23cd27e6a71d2d88b

                                      SHA256

                                      95760d2f49b695cb0dc03720e2cdce34d1215285023f2bb7690f268e434c7871

                                      SHA512

                                      6a9a481d130eef5a98b5d2b40ddca1d7aa83d7abb255368f3fdca85c395b0cd0711765143a6ec8f14696599cfd4876375449272f013969a59e7f26618a730b36

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\_lzma.pyd

                                      Filesize

                                      159KB

                                      MD5

                                      ecd60b380b7875d2521739e7acf365fc

                                      SHA1

                                      487ffde1f1a31f321a87658d22a1763624600304

                                      SHA256

                                      1dcb9689a2a3eb1c2554caec217d4f6a10cf677701bcb6f762d6cc2111d14c4a

                                      SHA512

                                      37db64611f7098c08089b17a88db638ec329fa2b652689a3a7509566110afe8eca3ac5e047530d628503d713e15584ad376631576fa9d3e9efb4a1ca0c3c1709

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\_multiprocessing.pyd

                                      Filesize

                                      30KB

                                      MD5

                                      484a580ca0398ae225eefe012738687e

                                      SHA1

                                      e1dfe5f2da99e890290fee74e9332697f5b80ce5

                                      SHA256

                                      cb1f313de6b1c6f152091b5044554c453de6378dc2eac17171ba4a262e30711f

                                      SHA512

                                      62ce6cc12b8a35ad3f7e83f71667e0290db5dbc66ded78fccfb2c2dedcf09d733489d779f892718f78746d0551a13a71687f07a42bef0cf45b9fa4dd0504943e

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\_overlapped.pyd

                                      Filesize

                                      45KB

                                      MD5

                                      565a3f09c8372725cb22ee89df38cb6e

                                      SHA1

                                      5f362a65096d1d3f000ebf08653dff328c154a44

                                      SHA256

                                      0b561d24933409fe061cb924739f7a677c7153ae66cd7dc242ef1ffbe334274c

                                      SHA512

                                      f09e9813a1676167dff38430aaf7e7d689d5271874147bb3dde5d4c66dbd3e417f24df065b74c721d31ff0c859da6487878e1fea95d26bd62a221e684d72e178

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\_queue.pyd

                                      Filesize

                                      29KB

                                      MD5

                                      aac0035f5b5868a3e92df59f19e00773

                                      SHA1

                                      b3215c188385010af8519af0a66b9075644c4760

                                      SHA256

                                      1ff1c01be25fd6797b263474c1c8df45107796a7e4d465e32a908d572d647b64

                                      SHA512

                                      a65975f3a1af79653a728aea801bc79de2274efcb5965f6433856c80f5584d16b46e339268068a3d5ca93216f0f3d81c7e79ac5a4eef2928dfeae0ed156d0b15

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\_socket.pyd

                                      Filesize

                                      78KB

                                      MD5

                                      ac90b2535025c3d2d88632591b619b73

                                      SHA1

                                      eee7a2803412a7bb362bd64cba378cfb5808d42b

                                      SHA256

                                      ed1d6e0aa8237e491dde3c3fdfa6f4df35585eadf4716473f98aa86aa0a910d9

                                      SHA512

                                      5fa573e3e2f712925cfc48ec5809493ef43db5c6694d2e244bebe6b9d2ceecfa5979619730321fd2a88ad59bbd5eb2b70672045e5062748ecd53fd216d116202

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\_ssl.pyd

                                      Filesize

                                      152KB

                                      MD5

                                      e7d8bbca8b419f220c8cd81b285cb4ae

                                      SHA1

                                      c83d4e44704d46ddafb186526666bcf37aa927ea

                                      SHA256

                                      5e54983cb975784a358b2a02738d9db1296e0ab7aee1503277d3fdd8cf43e41c

                                      SHA512

                                      628107783757d52efdedd0a13ecbc9ef4c6422916104716c7dcb62bcb5beb735ca30ff990dee2916f752c4a643438c464cd6f5fb63c1366060a8b9ec52c45dbd

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\base_library.zip

                                      Filesize

                                      828KB

                                      MD5

                                      73f8d61df85d3de5e66fa75499eb528a

                                      SHA1

                                      51ea08db8c3a4a36e7a83b7f2e2518d9cecf066a

                                      SHA256

                                      4f200ebb2c5fc088feb3b63b4a3e598aacaab70e7ac318ede54343a5d65ac01e

                                      SHA512

                                      72f19ebcd336a5358b4d32271881ce66542651c492fe94b4027a46927c4a2bfb00796a4f2bbb6fa924a943ca1cc51d82febf4ecd0b0caa978932e3b468703490

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\cv2\__init__.py

                                      Filesize

                                      6KB

                                      MD5

                                      eab99b31f1fd18e46e6e081ba3b5c06e

                                      SHA1

                                      9ca76b1097d58ef9c652aebfbeff32bfec17b25b

                                      SHA256

                                      b05b8000c71987cd4df824c1ed134b7fcd34617665e437b1aaec128f93d7f1c3

                                      SHA512

                                      7c4ea4a28f7876249b503155187bd59bcd9cf18a80264c8892e59e9fd7f3d461c91afc4c3c177dba48e1dfdd0feb5705b54b504f7daa886a2a0b72fddd1e80fc

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\keybinds.py

                                      Filesize

                                      4KB

                                      MD5

                                      ba6b93f22777b6c4794bb439cd839362

                                      SHA1

                                      7a02b68c839c53daff04255ee92db415e9034c66

                                      SHA256

                                      bc9548e307afd456096da0291bde060f01f2684794ed4c4af8449341dc02ee6d

                                      SHA512

                                      7cd85465675025e30c35e0d8b850891a31b23114bfa4fb3b75a5ee6d405916de299f92c9d22fbad67dfd5e7aea45545d64b685f7e0824e4b84839e010e7d510b

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\libcrypto-1_1.dll

                                      Filesize

                                      3.3MB

                                      MD5

                                      63c756d74c729d6d24da2b8ef596a391

                                      SHA1

                                      7610bb1cbf7a7fdb2246be55d8601af5f1e28a00

                                      SHA256

                                      17d0f4c13c213d261427ee186545b13ef0c67a99fe7ad12cd4d7c9ec83034ac8

                                      SHA512

                                      d9cf045bb1b6379dd44f49405cb34acf8570aed88b684d0ab83af571d43a0d8df46d43460d3229098bd767dd6e0ef1d8d48bc90b9040a43b5469cef7177416a2

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\libffi-7.dll

                                      Filesize

                                      32KB

                                      MD5

                                      eef7981412be8ea459064d3090f4b3aa

                                      SHA1

                                      c60da4830ce27afc234b3c3014c583f7f0a5a925

                                      SHA256

                                      f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

                                      SHA512

                                      dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\libssl-1_1.dll

                                      Filesize

                                      681KB

                                      MD5

                                      86556da811797c5e168135360acac6f2

                                      SHA1

                                      42d868fc25c490db60030ef77fba768374e7fe03

                                      SHA256

                                      a594fc6fa4851b3095279f6dc668272ee975e7e03b850da4945f49578abe48cb

                                      SHA512

                                      4ba4d6bfff563a3f9c139393da05321db160f5ae8340e17b82f46bcaf30cbcc828b2fc4a4f86080e4826f0048355118ef21a533def5e4c9d2496b98951344690

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\numpy.libs\libopenblas64__v0.3.23-293-gc2f4bdbb-gcc_10_3_0-2bde3a66a51006b2b53eb373ff767a3f.dll

                                      Filesize

                                      36.4MB

                                      MD5

                                      5e46c3d334c90c3029eb6ae2a3fe58f2

                                      SHA1

                                      ad3d806f720289ccb90ce8bfd0da49fa99e7777b

                                      SHA256

                                      57b87772bf676b5c2d718c79dddc9f039d79ec3319fee1398cc305adff7b69e5

                                      SHA512

                                      4bd29d19b619076a64a928f3871edcce8416bcf100c1aa1250932479d6536d9497f2f9a2668c90b3479d0d4ab4234ffa06f81bc6b107fad1be5097fa2b60ab28

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\numpy\core\_multiarray_tests.cp39-win_amd64.pyd

                                      Filesize

                                      63KB

                                      MD5

                                      46a229f9c54c0f0211325dcc3826aca9

                                      SHA1

                                      e746610ba4dad9cc9e731655104fa5b017ced543

                                      SHA256

                                      7dff04e2a5bf5ea15535b897db792bf3b7ad1591fea919c15b4e9dbd4c5f67c6

                                      SHA512

                                      21dcb83213802082fd266e7634dfe5933def4bdf964b32c8769b75063af763d9db0000b7ed34327d9d3b46572bde70492d6000e2380849436878f37646bc2bcc

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\numpy\core\_multiarray_umath.cp39-win_amd64.pyd

                                      Filesize

                                      2.7MB

                                      MD5

                                      f5604fe675f54e081a2e522461371670

                                      SHA1

                                      5430bd0fe7ab9abab2ba657a603485a105c325d4

                                      SHA256

                                      174fa7b850775f0224764bb754d4c0ca5515885480aac14a08a2ea8c305aac16

                                      SHA512

                                      584c7f8510384e8095afc3008a84da38fc3ada4de4e8cbf14f1a6eb83b2180edbae1353a8bcc249dc89f6c5516c84b1ea8dd5f8fc8ac91bbf95628f4077837b7

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\numpy\fft\_pocketfft_internal.cp39-win_amd64.pyd

                                      Filesize

                                      107KB

                                      MD5

                                      715be8257d3d4717f0fccd54b04e8563

                                      SHA1

                                      988f23ad08647713a1c7d08eb55d00bf35d9e647

                                      SHA256

                                      2f2049f9ee05aecdfc59be6ef059c5f97b2b6bdebe5e27fdd431ad67f788d8d7

                                      SHA512

                                      5973a365c5c8ed35f1aa5ccd06fb2a346092c8d97544fd31ca80c7f9f1b2c0c057f5661c676e69d50a2609b1dc5b98344d16fa2f6a24fb1ca8fc76c553b5fb4c

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\numpy\linalg\_umath_linalg.cp39-win_amd64.pyd

                                      Filesize

                                      104KB

                                      MD5

                                      db7697c1626d30e98eabf9822fb8a088

                                      SHA1

                                      35aae7bb6f45546006d9eeb6b482fc115b8cbc2f

                                      SHA256

                                      3327e82005d1259bbece28122c75a4e83bb508ee0cd62114adc285f21ae89365

                                      SHA512

                                      bc4b9a0114bac52f19ca3ba1261b1a95553fe21899aaf51f0d63d4383eef8fd8979f8ab697d384117d170a2eec4d75aa8ba6aa313d82a3875c32f2b00a0f820d

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\numpy\random\_bounded_integers.cp39-win_amd64.pyd

                                      Filesize

                                      251KB

                                      MD5

                                      bdd5db8721c48df94b9d7211f8acc5f8

                                      SHA1

                                      314da2c2978f43840f641fd6274177e4b0af9047

                                      SHA256

                                      1d5c98f95abc2c87533237b1200e14539b7c5d8f1bf90870c15cfc00d51097ff

                                      SHA512

                                      29874cda6595bd908c54a67c43bb8ad7b0d17ba1895650605d42b580a573395bfd4bf49453396ae131f192d2ab92627cf67667be19573fa6d79a39401c173033

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\numpy\random\_common.cp39-win_amd64.pyd

                                      Filesize

                                      170KB

                                      MD5

                                      075b073473a9529d0dbc2cbac637ce09

                                      SHA1

                                      903e1768a7a943a4fcfc122dc903f21ecd86c0e3

                                      SHA256

                                      48bf0e11f32dc18d4ae4bba02f952a21a167573326ae6da1a87dddd9349ec86c

                                      SHA512

                                      a8c2fb6e976ec26a11d5e2e1d23f1df59ffb71b7f5ae3983382ccee9bf256622c5ff27938fb5db4780e5be26f4ee2c749ffb8da594c84990581a54d4b68d961d

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\numpy\random\_generator.cp39-win_amd64.pyd

                                      Filesize

                                      678KB

                                      MD5

                                      f193fdafa9db9a528b12edad61cc6e00

                                      SHA1

                                      8a9c7e78035f864102a3d84886d107539b3baefc

                                      SHA256

                                      99f57f0ec077f5cf3aef47aa2ef5291964f74be5d73851f63c7fd15b87c31cbe

                                      SHA512

                                      a8e317a120481d84d123283d68ed25b181e3baf5708a90c1980b53444419da30a305122b817a3a05ec5305676010884c54dca4103b82b4ca91d0eb83f38d724d

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\numpy\random\_mt19937.cp39-win_amd64.pyd

                                      Filesize

                                      75KB

                                      MD5

                                      b15e49985a36102a282f4655d2115de2

                                      SHA1

                                      5cc2bf51e40738dabdfff5384c44398101777dca

                                      SHA256

                                      b7b81ef1df9952651c3473fd7d640d79b0524192050ae9bb8e2ab71e8eed3212

                                      SHA512

                                      30a1bc3d4fa27a5fda2fc4dde71f9a545a690bad1fd66c417c13e48918597f0e0daca88ca4a301b11457ca47746851fb70d2635c67722777baac0505ddcec864

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\numpy\random\_pcg64.cp39-win_amd64.pyd

                                      Filesize

                                      82KB

                                      MD5

                                      c2a8002bf0aa62e0bfe0f1e938a12ef6

                                      SHA1

                                      ad15a572d51f628757f227f881e004052a93a193

                                      SHA256

                                      c67705d6d3843a3656a8cd6eedac62c2b4209d3f801a92f3b2b5000a75600b8a

                                      SHA512

                                      b3fbd58cae741c00a14ad630ffacda5fa9f74bf6e558a7e8ecdd7418a131f7f615220db042bb55939e7cf754fa9cb6ad4ca19f8b7da39fd64f507b22e90d5907

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\numpy\random\_philox.cp39-win_amd64.pyd

                                      Filesize

                                      69KB

                                      MD5

                                      18e0b9676b9724a3931491828966beb2

                                      SHA1

                                      0c8846dfdb2900268009042dd53dff90570096d0

                                      SHA256

                                      73e35656e4e26137f771fddadb1b7a806fa8399bfa8abb66b63e1a9ede809d18

                                      SHA512

                                      5e4dcba88657bc099ac6bd43c46fbd88aef42e8f7ec3698cfb8334ffc46e5f12d0b74b2e8b00297a8f2fb943accf123debbea384cb4da8cedaa3c764de86b49e

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\numpy\random\_sfc64.cp39-win_amd64.pyd

                                      Filesize

                                      50KB

                                      MD5

                                      eeecd86be89a4944a7fc0569f31a48ec

                                      SHA1

                                      572f70eca1fb29d9b12cc4bb3278309d0dd3aabc

                                      SHA256

                                      5f778438d9bfc32b4ad3cb0ef7182af098504a081aa5e17db077cf424dae8d42

                                      SHA512

                                      3f3566734d6bd057231253b026b41dc3ae8f6ea579ee54a58c18d1ad66f8cddbc3785c3a234ffa5f5cb9d3e1ca4efad1cb8b9728c4e3473dace0f00b68033d09

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\numpy\random\bit_generator.cp39-win_amd64.pyd

                                      Filesize

                                      160KB

                                      MD5

                                      b2879af0ec91b94458e85c03c441cd14

                                      SHA1

                                      d8431b9e52277dd768666a7a20e4c5217362a980

                                      SHA256

                                      8b7b29f63f051f93ab7be369e7fd22cab1385e3aaa83d7beb3267df4f39154ab

                                      SHA512

                                      3dbce2b102e2a7ad62881ff24d2446ab25dc760bd5c1af8ee8780d08a94270d55b5754d99fcea1e5fbf885d3789a7983177e91ba132edffb38274b6f45298247

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\numpy\random\mtrand.cp39-win_amd64.pyd

                                      Filesize

                                      583KB

                                      MD5

                                      12c6aab00309d50d5ff5e7b6877f83d6

                                      SHA1

                                      d53b321b496ff637643570a948a7238a3098be9c

                                      SHA256

                                      f2206738b19668bc5718d0e684890ab9a6d420aac35d5c784d4cc35a6d520493

                                      SHA512

                                      564e75b86af8ed3fccec51f85ad5442b5b68ee70393126a61f0ff174d1d0165e427e413f8b02724dcf748a4bdfa3f1b58a5d1fbf2adbd066be690471daa10673

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\pyexpat.pyd

                                      Filesize

                                      199KB

                                      MD5

                                      34ea1b1c7d3a9effda3a485d21abade3

                                      SHA1

                                      6fb594c0c73e02b5f89b019f188c4ca69ba5dcb1

                                      SHA256

                                      215614c89aed025166d3434252bd914ea2ac5af0762d2dd01ed4f4966d9ed711

                                      SHA512

                                      8874be2826e0d3a94e9fb400438bf9b0197ff47eff4e7af3a643934c6e56905b658acf23fbf088be0926700723bce62125c418ca927d41c2935bdff8b3ca912c

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\python3.DLL

                                      Filesize

                                      58KB

                                      MD5

                                      2ddd2ee635db86575c416f075c41ac8c

                                      SHA1

                                      99d03f524823059066995181ba21be29d90f2488

                                      SHA256

                                      be0b573bc6f005235354c246e1f9f626793687f50ad632feb2e767398f414fe3

                                      SHA512

                                      b84d4b3ca1298897cfafe195394ec6fdb51ed42ce0ca9ea0ab60dc2a8c31b2c865c4cc4fe0df3ffe1c813d21ca6013661e0cb83a91614472c7f6e3a7c78c1f06

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\python39.dll

                                      Filesize

                                      4.3MB

                                      MD5

                                      5871ae2a45d675ed9dd077c400018c30

                                      SHA1

                                      ddc03af9d433c3dfad8a193c50695139c59b4b58

                                      SHA256

                                      5d0ff879174faec03eb173eb2088f2e7519f4663dd6bfe5b817ec602c389ae20

                                      SHA512

                                      d87a90dbf42c528bc3fa038eb83d4318d2e8577a590bf9c84641c573b5b2fea83aac91bb108968252e07497424ed85f519a864e955f94a7f8e87bfc38e0f4b7b

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\select.pyd

                                      Filesize

                                      28KB

                                      MD5

                                      0906200f02e2ee5eb3da08a64f10a69e

                                      SHA1

                                      5afcb2cc53a6d8ca85d1fe51389632b8b84d5194

                                      SHA256

                                      fb4fa3aed7a7955d4f78a3fbc2a6e6e1ab8d9e3768bb8b3f3a85866d1f2d74d5

                                      SHA512

                                      b69e9f7fdd77f776acd056cc8a2d8b34da76e1f30a50117b9aa6bf467a9ce7178407fc6b5e2126c0eea6f995ffa8ae94f92e0632c566fc39bab29ff278193cbc

                                    • C:\Users\Admin\AppData\Local\Temp\_MEI13122\unicodedata.pyd

                                      Filesize

                                      1.1MB

                                      MD5

                                      814d6938da8e46d79b64326aa967a1a0

                                      SHA1

                                      6d020c9ca51d7d4e77c197f5394d7e157482cea3

                                      SHA256

                                      4059acb95b05b4536c983ebd232dc5aec00828914e61f31674b0fdf41656deb6

                                      SHA512

                                      f286b6e813bcd3ee9aad25f804689e3e8bbe13a41bb5715e49bcc1dc7ccae2f0c7595dbaabad806fea65825952e5e31d32ac9b31e583bf4b7cdf716ae6fa08d1

                                    • memory/624-243-0x00007FFEE7860000-0x00007FFEE9916000-memory.dmp

                                      Filesize

                                      32.7MB