Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240426-en
  • resource tags

    arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    16-05-2024 07:07

General

  • Target

    source_prepared.exe

  • Size

    10.7MB

  • MD5

    ae2dfddcc27d95292af179d705e595f7

  • SHA1

    06700eb7e0579d1bc6df8bbf35025e63e3d5852b

  • SHA256

    84c0528ffb6db5baadcf0761bda6d54b3f7995d9e47e9a1d1e8e7eac6a2875d0

  • SHA512

    a59fd21e902daa9dc1fe3007e7a381191552c23d1bb96d64154c3dcc411b5fc47d885d434bd19afac2f73eac7655bc9aa852ee0875b6190a634d67d32a37e56a

  • SSDEEP

    196608:kh3MGe6XEhUYHpZeeNwbnKFJMIDJuRtJ55mIQFAlGHST5Umu8bT:/mExwbKFqyOtT5mrVHyTl

Score
7/10
upx

Malware Config

Signatures

  • Loads dropped DLL 20 IoCs
  • UPX packed file 64 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 26 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\source_prepared.exe
    "C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3876
    • C:\Users\Admin\AppData\Local\Temp\source_prepared.exe
      "C:\Users\Admin\AppData\Local\Temp\source_prepared.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "ver"
        3⤵
          PID:2448
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      1⤵
      • Enumerates system info in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2080
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x100,0x104,0x108,0xe0,0x10c,0x7ffdd87dab58,0x7ffdd87dab68,0x7ffdd87dab78
        2⤵
          PID:4784
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1632 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:2
          2⤵
            PID:908
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:8
            2⤵
              PID:832
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:8
              2⤵
                PID:3160
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3168 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:1
                2⤵
                  PID:492
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3236 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:1
                  2⤵
                    PID:2936
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4296 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:1
                    2⤵
                      PID:2296
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4492 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:8
                      2⤵
                        PID:3144
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4576 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:8
                        2⤵
                          PID:5084
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4504 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:8
                          2⤵
                            PID:1460
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4836 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:8
                            2⤵
                              PID:4864
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:8
                              2⤵
                                PID:4340
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=4992 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:1
                                2⤵
                                  PID:3128
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.22000.1 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1792 --field-trial-handle=1844,i,8534873937419916403,8813154052136787678,131072 /prefetch:2
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:2896
                              • C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe
                                "C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"
                                1⤵
                                  PID:2324
                                • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe
                                  "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca
                                  1⤵
                                  • Modifies registry class
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2868

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\0dc12aa5-6492-48db-8802-3ad2e3ff5e30.tmp

                                  Filesize

                                  7KB

                                  MD5

                                  4690c97f225d540b4c91086c2877b692

                                  SHA1

                                  770246ce1292b37fd99d32d02c034fc038cc97fb

                                  SHA256

                                  19f714dbfab3979555e08727a76a16e48f5f5a29b7c25375e7db02063446f326

                                  SHA512

                                  8ec5d87ca1e73fe00955fdcc2d1bd1bf99361d1d8b73c37689f58eb056427ea587e29f9e5e9c2142592d41f83b69bb00e330934405bec4604582a93db514c4df

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Cache\Cache_Data\f_000007

                                  Filesize

                                  199KB

                                  MD5

                                  585ac11a4e8628c13c32de68f89f98d6

                                  SHA1

                                  bcea01f9deb8d6711088cb5c344ebd57997839db

                                  SHA256

                                  d692f27c385520c3b4078c35d78cdf154c424d09421dece6de73708659c7e2a6

                                  SHA512

                                  76d2ed3f41df567fe4d04060d9871684244764fc59b81cd574a521bb013a6d61955a6aedf390a1701e3bfc24f82d92fd062ca9e461086f762a3087c142211c19

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir\the-real-index

                                  Filesize

                                  168B

                                  MD5

                                  d5223595ad60cba6f4a4839528b84052

                                  SHA1

                                  794345276c57b5c5e4bff411f8c35e646ecf757b

                                  SHA256

                                  252c295b7bf41a1fccb7e3db5e6f911dfe624c9707a23eb7153c7a41d0be1dd4

                                  SHA512

                                  2034a9f4aae6f1fd545a8fc551dbbd8b6fabcaab696efde2716ad4935f2f530aad6c58c29d9b11ea4e32ff5971696a8538ee91c0bc847100153f9432b1812c5c

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\Network Persistent State

                                  Filesize

                                  2KB

                                  MD5

                                  c986ab5a838f445a78886ad8c949fada

                                  SHA1

                                  ca1f8ada0f8440787a792b1cc6180e6ce7018757

                                  SHA256

                                  cb89ba3fe136e2dd94217c56f386844accc3e8f872384bd0950becf19d72a1bb

                                  SHA512

                                  7339fce359e6be6f8c4cd6f23e1be89f69dcae8a1f153a7b9bcb97cdcc22c484b3b35961dd20d0077285d156ba1167637edf00060b4fa2dba0d9ee0d424d0b02

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                                  Filesize

                                  2B

                                  MD5

                                  d751713988987e9331980363e24189ce

                                  SHA1

                                  97d170e1550eee4afc0af065b78cda302a97674c

                                  SHA256

                                  4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                                  SHA512

                                  b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  356B

                                  MD5

                                  f878567aa11304e9ffda097665c10606

                                  SHA1

                                  e44f6a40d8131ae343c741ca4391aa228484e513

                                  SHA256

                                  0f8637290131ad0dec8ae07bde701f82da307565a27cb469c16e99c1a1aaabf5

                                  SHA512

                                  cfe5ac72865fc963641c7f558ef1fb6243cf8ae2e5dd205a2b2502f5a13fa56498491f34a4288f0cf5fba6fb6c8734b6e9a81c21856db6a093d4a53ac2b636e3

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\TransportSecurity

                                  Filesize

                                  356B

                                  MD5

                                  79a5a5d1c0ea59c09eb73d1751c6de8f

                                  SHA1

                                  55a94ea4c5015c5f2e7aae20792356fbca0218a5

                                  SHA256

                                  13d8177182ab24697198e1d0912c1bf7f21fc649308940717af62405d7090a26

                                  SHA512

                                  2e431154a6d5fedb3e542704ddeee71488b2fc8ab1ee948594b5440341542b0c7c7e1db20540a7260cc1844815210a22cb1da6e7f1cbd35142a0886e258ef938

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Preferences

                                  Filesize

                                  6KB

                                  MD5

                                  1418d56a59e16185aa88264c3bc22bb8

                                  SHA1

                                  2c3c11da214df909a3a883cccd1c8cea9f3dfbd5

                                  SHA256

                                  7297831f6411a896757a7361c1fd888f9a4ec3638b86ee00fac27e8c47db9c5d

                                  SHA512

                                  7d7a00b7dc8f6641d94b8beca5112458e151d84ad9e290d58444a85aa2210eb0971416de0e2cf06213134f767798ee69e5c99d8bc6a0ad2a90246e21a917593c

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Secure Preferences

                                  Filesize

                                  16KB

                                  MD5

                                  5f05fcbee71181505bdaf0fba68e8e64

                                  SHA1

                                  9557f02ce88a857c1de6d972356de99074762696

                                  SHA256

                                  7c8bb68eabfaed07e889bbeaab7fa590242cbb529e54e88c053613aa02251f60

                                  SHA512

                                  7606300da8cf1c83be7df5d158a47a91036ccb119a0be986ea7d8d4475474fa8ab9a67c3bb6b44fdf4cdf06fe9135f3f39cba060ac51c0c7162a430eb96be8a2

                                • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Local State

                                  Filesize

                                  258KB

                                  MD5

                                  9d31c8d4507373c2e2f8207e28225fbf

                                  SHA1

                                  69d33470e0325696503f6a6ff3db91ebe2cbdeec

                                  SHA256

                                  b5de84513eef3da5ce591b146d2f1bbd157c381e868a54fc8fc3dcf42429b995

                                  SHA512

                                  10c44041c8350b277cf4d0f94cae0d4fed444926d9aeaf27128ff8a270e5b9078d8d0fd1ba7e03ad3bfd66456e52db7a0857f5d8e2dfe9c22141c17a1b2e5786

                                • C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat

                                  Filesize

                                  10KB

                                  MD5

                                  2cb9e3f89741961748d38d15dfecc8fb

                                  SHA1

                                  11f89dfac73dfacb194fa01bf6e7fddb38c1f6d7

                                  SHA256

                                  e76dcf1390543fde2ae6fd8263e90df10923df9dfe78a5fb588a50654577fd13

                                  SHA512

                                  20557311d13320d2f7c8bfb99e49c8af30dbcbace0faaa5101f9ea893a017a55100bf2b3c466c9d9cfe4fa8a8affcef9223a870abbcf571492fa90abd0e748f2

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\PIL\_imaging.cp310-win_amd64.pyd

                                  Filesize

                                  735KB

                                  MD5

                                  c7abc4d0572223940931179a10709b47

                                  SHA1

                                  47ccdcf47986e23ceccab1710b6dfdc1c5cb6791

                                  SHA256

                                  9a6330706abda947f8f7fa904387b6e054db9bda509f63aa080d90188dffbea0

                                  SHA512

                                  fd9064aaaa4a1a419ee723e07648622ca421dff69d64ab801d52c2235e34b4067930e8ac47b7a003aec05ea5a0b635a9a80abcbd78704c315c825e6a127267e6

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\VCRUNTIME140.dll

                                  Filesize

                                  106KB

                                  MD5

                                  870fea4e961e2fbd00110d3783e529be

                                  SHA1

                                  a948e65c6f73d7da4ffde4e8533c098a00cc7311

                                  SHA256

                                  76fdb83fde238226b5bebaf3392ee562e2cb7ca8d3ef75983bf5f9d6c7119644

                                  SHA512

                                  0b636a3cdefa343eb4cb228b391bb657b5b4c20df62889cd1be44c7bee94ffad6ec82dc4db79949edef576bff57867e0d084e0a597bf7bf5c8e4ed1268477e88

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\_asyncio.pyd

                                  Filesize

                                  34KB

                                  MD5

                                  bac1b37093d9a3d8a69c4449067daf79

                                  SHA1

                                  6debc17c8446915b7413685da449f028cf284549

                                  SHA256

                                  b4130ab50e425027634a8a4c01c320a70b8529f2988c3a7fb053e07847b68089

                                  SHA512

                                  24e108ed396c15fe70a4c915a5adadbfaddacab93d20109574b2f3875ed76225f2444098f2f2c47613f5df16d31c5c93dcc77f5af7b6d9b7739d1e392260ec59

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\_bz2.pyd

                                  Filesize

                                  46KB

                                  MD5

                                  9ae5b35c4be5684c4e20eca61c31b04f

                                  SHA1

                                  22ce82be0de9ce1975daf9779f4c03373579d2ee

                                  SHA256

                                  9ecc29ef0eb63bfd91880bd13d1a8e8ae81d6dfd3cb0608410c1c24338e0760f

                                  SHA512

                                  0784831b295680d5e53b3e94e7262fbb6554e7100ed66d33c370151a385ae7e979204cde55dc00ec75874e8a52152b8caf8eeaa446f3e6421322dac5af6f7666

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\_cffi_backend.cp310-win_amd64.pyd

                                  Filesize

                                  71KB

                                  MD5

                                  d968ebcdbec08ebaa42356ca155ac6a1

                                  SHA1

                                  7953a0a9c7c38349d629968a1dbd7e3bf9e9933c

                                  SHA256

                                  670379d72b8ac580f237a7236c4b51933b2576e8dd7689e09b9e58d55818a979

                                  SHA512

                                  5dbfb6e928f8b96d03dd4dabf2c21f8e22a3e0983152c167e768e9e1b6771432d706d5250032ba3ffb067198fb2a18bf3e05b09ddbc84c2ec945f3d865a57ef7

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\_ctypes.pyd

                                  Filesize

                                  56KB

                                  MD5

                                  fab57c847ccd83d1eda8d0f70223284c

                                  SHA1

                                  9036fb9ddf58384d41805b0f5701d0dd3fc9fe5d

                                  SHA256

                                  f94440debb2c034d504859edb115ae1ba3ec3f65a084178c810eada77cc0b803

                                  SHA512

                                  4dfff55c12415fcf4b75594bee323423a8bcf7cbec0384978d2cde23c803aa447e9935e3990e5f87aa70e4187890ac1b4bed68780bda479707e17a68d6dd398d

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\_decimal.pyd

                                  Filesize

                                  103KB

                                  MD5

                                  cf941d45cafbebd95dcb1dca58da1b0d

                                  SHA1

                                  94cbcd0f53286afedadd262634fb72a341ceeeba

                                  SHA256

                                  4094591722d9ee58d739ebcdabf5c6c128014ff19c337b5b2924d0171929a5c0

                                  SHA512

                                  9b29c7813c04838f343f08cf12a3a8c05830776551c49af8ed0c025bc4e3074f29dc7c1cfbd9ede879ddee6642adb9bd6fe01aef6ca4a9c6d3c8ecc245a9285c

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\_hashlib.pyd

                                  Filesize

                                  33KB

                                  MD5

                                  0dc4e915d9735acac7b8661a6d542d5a

                                  SHA1

                                  10b449ab2b24cf5e7cad394c21d91434f3cd543a

                                  SHA256

                                  0855543e345e479921761853f7fbbe8834fef7e0f950ca4e087e8e19c3f35271

                                  SHA512

                                  51cd2c7c66a3d9fb4cf99df01de388c11429a961542a6454509131e1dbe776ca040668e50141f3abaab8f760484240c22e047a278dd3ce932745075efab33139

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\_lzma.pyd

                                  Filesize

                                  84KB

                                  MD5

                                  c1b2399c226b9010dfaa6a1022c636b0

                                  SHA1

                                  d5dfca039b69b32ad8b5d65c197e0f59fb7aa954

                                  SHA256

                                  6a962508477ac29ae37b40e9fe6444382a528390fe4a0c8f1685cabcf91f1e94

                                  SHA512

                                  45dc18daf7b3c8e9350aa71ae0b58e452fa275a4fb25dbc26c003e46c49b73b7606c86a7c7e0e2dd91e30bdd35c3007843f9d749a7e6138d953e60a839186d02

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\_multiprocessing.pyd

                                  Filesize

                                  25KB

                                  MD5

                                  9e1a8a2209262745323a3087e3ca5356

                                  SHA1

                                  db5db846be89ed930291afd3e0b5ee31f3e8a50e

                                  SHA256

                                  f7bc9e58a91241d120998e2125173b8ce05fb178e4c77825bcae0f9afd751769

                                  SHA512

                                  bb5741285b773b36a2c24f15d28d172cb96220a662111a587f5ea6a9652a3e09b4795737ae8d2785243990039ebb8f7a597423e3dbd9a69a9cc4917222fa65e7

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\_overlapped.pyd

                                  Filesize

                                  30KB

                                  MD5

                                  a752451482e3a12bb548d671dfdb8b45

                                  SHA1

                                  cd1b4b5fb4bd967a88f22a309fc4f91df2c5a6e9

                                  SHA256

                                  6c415e1ff4c4cc218c8b3df6678f1eab8d4206bd269f68512910fa04b64b8f22

                                  SHA512

                                  841408f1e01ac372e80882fd2e38207a92a26d5c445172ddc776279e5b08572b72a88011402d644135db145fd0893278999a09db15cc18920103b90fdb76de56

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\_queue.pyd

                                  Filesize

                                  24KB

                                  MD5

                                  5bd3fbb7f1171cffe63b6b47e5e5fb15

                                  SHA1

                                  d515256427a6226a6e4427f50609150dab6932d0

                                  SHA256

                                  7c58a79fa60ed0c4cdc7cfca402f253a0ca9d3ae5e44a874f5c985b63d747846

                                  SHA512

                                  4dca6f530cddb7ed1900c55e6700418ba35c7152c7cf81fae3560abdfee44bf6e27f9732a3bad41b91d87399c5759153efedff07d51f279b992c0638efc38e14

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\_socket.pyd

                                  Filesize

                                  41KB

                                  MD5

                                  4d8292c93191560e28fb7b07da0c7a18

                                  SHA1

                                  581496c7cdc4d21831b319e4fbddeefd0e199325

                                  SHA256

                                  d1f5ea3f8990b244383745d21b69d3049889edaa19cb2f4d2962569c09e74585

                                  SHA512

                                  e9368c79b0377d94b1a5fef914c11856b5953d765e2b0eb7ae4020cd69176c705d7853d787bf3e0d076cb289d41e78e0dfb16c8abbe981e1e9535c73b690f271

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\_ssl.pyd

                                  Filesize

                                  60KB

                                  MD5

                                  38ca1ba20bfff771bb89b1be9fb5857b

                                  SHA1

                                  8bfafe01eb4153da807af132d6b6c0c6e5af03e4

                                  SHA256

                                  ed91c75638b9ee9a6ff771a735d6ccbb9273b9fcbbe5ee8734ee0130e3b8966e

                                  SHA512

                                  c5e0ed2b4d24e628bdc275f9540d7316a42af0cf098b3fa1232a270c7cb68110120a884c5cea254220b9a58f9a16ee12cc394e54bc43982271c88f6cb0a7a80b

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\_uuid.pyd

                                  Filesize

                                  21KB

                                  MD5

                                  aa65dc954ce85134a8f5d8604fa543aa

                                  SHA1

                                  75a31d76c85b3a78c906c0564fa7763e74c2fc49

                                  SHA256

                                  d7b691db91a6bdad2256c8ef392b12126090c8f4d1b43bfd3ec5a020b7f6a7ab

                                  SHA512

                                  e40b03e6f0f405295b3cde5e7f5b3fdbb20de04e9715b4a31eebddf800918d86ac1b74431bb74ed94c4326d77699dd7b8bbe884d5718f0a95ca1d04f4690ea9b

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\base_library.zip

                                  Filesize

                                  859KB

                                  MD5

                                  22fee1506d933abb3335ffb4a1e1d230

                                  SHA1

                                  18331cba91f33fb6b11c6fdefa031706ae6d43a0

                                  SHA256

                                  03f6a37fc2e166e99ce0ad8916dfb8a70945e089f9fc09b88e60a1649441ab6e

                                  SHA512

                                  3f764337a3fd4f8271cba9602aef0663d6b7c37a021389395a00d39bd305d2b927a150c2627b1c629fdbd41c044af0f7bc9897f84c348c2bccc085df911eee02

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\libcrypto-1_1.dll

                                  Filesize

                                  1.1MB

                                  MD5

                                  8e7025186c1c6f3f61198c027ff38627

                                  SHA1

                                  79c6f11358c38bda0c12ee1e3ab90a21f4651fa1

                                  SHA256

                                  f393f54886674e42bb7667087c92af67bd46e542c44ddff11c5061481261c90e

                                  SHA512

                                  4bbbf7d0a51aec361779d7735c6a91f1bdd468da0aaa3626c3cb52128c998d6454be8c473c8743172ffcea9dc66403a5a81ff5535d9baf87fa6ab990a35add41

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\libffi-7.dll

                                  Filesize

                                  23KB

                                  MD5

                                  36b9af930baedaf9100630b96f241c6c

                                  SHA1

                                  b1d8416250717ed6b928b4632f2259492a1d64a4

                                  SHA256

                                  d2159e1d1c9853558b192c75d64033e09e7de2da2b3f1bf26745124ed33fbf86

                                  SHA512

                                  5984b32a63a4440a13ebd2f5ca0b22f1391e63ac15fe67a94d4a579d58b8bb0628980a2be484ac65ad3a215bbe44bd14fe33ec7b3581c6ab521f530395847dd5

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\libopus-0.x64.dll

                                  Filesize

                                  217KB

                                  MD5

                                  e56f1b8c782d39fd19b5c9ade735b51b

                                  SHA1

                                  3d1dc7e70a655ba9058958a17efabe76953a00b4

                                  SHA256

                                  fa8715dd0df84fdedbe4aa17763b2ab0db8941fa33421b6d42e25e59c4ae8732

                                  SHA512

                                  b7702e48b20a8991a5c537f5ba22834de8bb4ba55862b75024eace299263963b953606ee29e64d68b438bb0904273c4c20e71f22ccef3f93552c36fb2d1b2c46

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\libssl-1_1.dll

                                  Filesize

                                  203KB

                                  MD5

                                  0bfdc638fbe4135514de3aebf59fa410

                                  SHA1

                                  963addfdadf918339dfcab33e07bb6c48c86099e

                                  SHA256

                                  77affb7e88ab70fa04e382e29bf04a94ddf36c5cbd88b29ff33e15912d83ed01

                                  SHA512

                                  768abcc391eea4a3b34b0aade99932cd9befb922dcf9e720edf4c4719938214236e8668eca67026bd07567fbd10bbba98d63f47d63a81c7be1adce3bdd1973e4

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\pyaudio\_portaudio.cp310-win_amd64.pyd

                                  Filesize

                                  127KB

                                  MD5

                                  52587c9e32674d86e37f8c4e5e7d7155

                                  SHA1

                                  fce92156f1c53f6cf1ec237e5312aaffd9a10098

                                  SHA256

                                  18d562189f497f99d833b3b69e1c05fcd1f4a44c2795870a97cbf894b70d42ad

                                  SHA512

                                  c9fafbd5346d5fc33150ce272af071e407e0ce7cf02b6aa45f320d66992373d4f25309f218da2a4d5e0a76e1d7ceba22357bfa6b7ccf07b58b753c30662c9d62

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\pyexpat.pyd

                                  Filesize

                                  86KB

                                  MD5

                                  9cbd08544dce0712557d8ab3fa0d2d15

                                  SHA1

                                  cff5ea26bd61330146451390d6cecbda1c102c57

                                  SHA256

                                  77813956d86430e1d850989eca1ace8641b7523ecbe1de825bd2fd7094f15f2c

                                  SHA512

                                  e9879b10f26b4205d389de77a978135d285339d971ddae6050cd8453aecf7ed8e39834a685c77aa1beddb8d7d922f4390278c772beb9cd0bfbd7cc8a77c7fc90

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\python3.DLL

                                  Filesize

                                  63KB

                                  MD5

                                  c17b7a4b853827f538576f4c3521c653

                                  SHA1

                                  6115047d02fbbad4ff32afb4ebd439f5d529485a

                                  SHA256

                                  d21e60f3dfbf2bab0cc8a06656721fa3347f026df10297674fc635ebf9559a68

                                  SHA512

                                  8e08e702d69df6840781d174c4565e14a28022b40f650fda88d60172be2d4ffd96a3e9426d20718c54072ca0da27e0455cc0394c098b75e062a27559234a3df7

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\python310.dll

                                  Filesize

                                  1.4MB

                                  MD5

                                  933b49da4d229294aad0c6a805ad2d71

                                  SHA1

                                  9828e3ce504151c2f933173ef810202d405510a4

                                  SHA256

                                  ab3e996db016ba87004a3c4227313a86919ff6195eb4b03ac1ce523f126f2206

                                  SHA512

                                  6023188f3b412dd12c2d4f3a8e279dcace945b6e24e1f6bbd4e49a5d2939528620ceb9a5f77b9a47d2d0454e472e2999240b81bed0239e7e400a4e25c96e1165

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\select.pyd

                                  Filesize

                                  24KB

                                  MD5

                                  8b91bc5b3b28d3249b1886c3486727b7

                                  SHA1

                                  17e07af111d3c7dc0a1525dba5ca8360692360f8

                                  SHA256

                                  e88ae878cf7760a627c5af55fafa7e368c8d0bbc8b8a8d4af994d45dbf793cc2

                                  SHA512

                                  dd30cb9ee09a6195500a0d3cca7677e2d63d55637324f2f41aed7feaca148af81d318808d82782bf3f37f0a6c85ef14384ea01f1da5a527e4d68b24f1143f238

                                • C:\Users\Admin\AppData\Local\Temp\_MEI38762\unicodedata.pyd

                                  Filesize

                                  287KB

                                  MD5

                                  7b9d6bb4bae7177720e25f3ce6cf6799

                                  SHA1

                                  b316d70aa7d09c047a516f0bc5fb6b3469eeb072

                                  SHA256

                                  286fa59eeec3b6eb2382cb7a1c92da3b70ba5308bd5435e793cf9579da0a97a3

                                  SHA512

                                  efda641a23363d2e5e6a1f19fa064fdba5a2ba9ae8deab3e8b8b45bed144d5209776a063f165f22365904797a4642f39aa9cec3dd153106a641bf13e067f7ad1

                                • memory/1536-96-0x00007FFDD8FC0000-0x00007FFDD8FF4000-memory.dmp

                                  Filesize

                                  208KB

                                • memory/1536-164-0x00007FFDD8610000-0x00007FFDD86C8000-memory.dmp

                                  Filesize

                                  736KB

                                • memory/1536-107-0x00007FFDD9370000-0x00007FFDD9394000-memory.dmp

                                  Filesize

                                  144KB

                                • memory/1536-105-0x00007FFDD8F40000-0x00007FFDD8F55000-memory.dmp

                                  Filesize

                                  84KB

                                • memory/1536-111-0x00007FFDC6BE0000-0x00007FFDC6E25000-memory.dmp

                                  Filesize

                                  2.3MB

                                • memory/1536-104-0x00007FFDC73C0000-0x00007FFDC782E000-memory.dmp

                                  Filesize

                                  4.4MB

                                • memory/1536-115-0x00007FFDD85B0000-0x00007FFDD8605000-memory.dmp

                                  Filesize

                                  340KB

                                • memory/1536-114-0x00007FFDC7040000-0x00007FFDC73B5000-memory.dmp

                                  Filesize

                                  3.5MB

                                • memory/1536-116-0x00007FFDDC690000-0x00007FFDDC6A4000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/1536-117-0x00007FFDDC2B0000-0x00007FFDDC2C9000-memory.dmp

                                  Filesize

                                  100KB

                                • memory/1536-118-0x00007FFDD8FC0000-0x00007FFDD8FF4000-memory.dmp

                                  Filesize

                                  208KB

                                • memory/1536-130-0x00007FFDD8F60000-0x00007FFDD8F8E000-memory.dmp

                                  Filesize

                                  184KB

                                • memory/1536-133-0x00007FFDD9350000-0x00007FFDD9360000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1536-132-0x00007FFDD8F40000-0x00007FFDD8F55000-memory.dmp

                                  Filesize

                                  84KB

                                • memory/1536-131-0x00007FFDD8610000-0x00007FFDD86C8000-memory.dmp

                                  Filesize

                                  736KB

                                • memory/1536-119-0x00007FFDC73C0000-0x00007FFDC782E000-memory.dmp

                                  Filesize

                                  4.4MB

                                • memory/1536-134-0x00007FFDC6BE0000-0x00007FFDC6E25000-memory.dmp

                                  Filesize

                                  2.3MB

                                • memory/1536-136-0x00007FFDC73C0000-0x00007FFDC782E000-memory.dmp

                                  Filesize

                                  4.4MB

                                • memory/1536-153-0x00007FFDD9370000-0x00007FFDD9394000-memory.dmp

                                  Filesize

                                  144KB

                                • memory/1536-168-0x00007FFDD85B0000-0x00007FFDD8605000-memory.dmp

                                  Filesize

                                  340KB

                                • memory/1536-167-0x00007FFDC6BE0000-0x00007FFDC6E25000-memory.dmp

                                  Filesize

                                  2.3MB

                                • memory/1536-166-0x00007FFDD9350000-0x00007FFDD9360000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1536-165-0x00007FFDD8F40000-0x00007FFDD8F55000-memory.dmp

                                  Filesize

                                  84KB

                                • memory/1536-108-0x00007FFDD9350000-0x00007FFDD9360000-memory.dmp

                                  Filesize

                                  64KB

                                • memory/1536-163-0x00007FFDD8F60000-0x00007FFDD8F8E000-memory.dmp

                                  Filesize

                                  184KB

                                • memory/1536-162-0x00007FFDD9360000-0x00007FFDD936D000-memory.dmp

                                  Filesize

                                  52KB

                                • memory/1536-161-0x00007FFDC7040000-0x00007FFDC73B5000-memory.dmp

                                  Filesize

                                  3.5MB

                                • memory/1536-160-0x00007FFDDC720000-0x00007FFDDC72D000-memory.dmp

                                  Filesize

                                  52KB

                                • memory/1536-159-0x00007FFDDC2B0000-0x00007FFDDC2C9000-memory.dmp

                                  Filesize

                                  100KB

                                • memory/1536-158-0x00007FFDD8FC0000-0x00007FFDD8FF4000-memory.dmp

                                  Filesize

                                  208KB

                                • memory/1536-157-0x00007FFDDC690000-0x00007FFDDC6A4000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/1536-156-0x00007FFDD9000000-0x00007FFDD902D000-memory.dmp

                                  Filesize

                                  180KB

                                • memory/1536-155-0x00007FFDDE9E0000-0x00007FFDDE9F9000-memory.dmp

                                  Filesize

                                  100KB

                                • memory/1536-154-0x00007FFDE23E0000-0x00007FFDE23EF000-memory.dmp

                                  Filesize

                                  60KB

                                • memory/1536-102-0x00007FFDD8610000-0x00007FFDD86C8000-memory.dmp

                                  Filesize

                                  736KB

                                • memory/1536-100-0x00007FFDD8F60000-0x00007FFDD8F8E000-memory.dmp

                                  Filesize

                                  184KB

                                • memory/1536-98-0x00007FFDD9360000-0x00007FFDD936D000-memory.dmp

                                  Filesize

                                  52KB

                                • memory/1536-94-0x00007FFDDC2B0000-0x00007FFDDC2C9000-memory.dmp

                                  Filesize

                                  100KB

                                • memory/1536-95-0x00007FFDDC720000-0x00007FFDDC72D000-memory.dmp

                                  Filesize

                                  52KB

                                • memory/1536-88-0x00007FFDD9000000-0x00007FFDD902D000-memory.dmp

                                  Filesize

                                  180KB

                                • memory/1536-89-0x00007FFDDC690000-0x00007FFDDC6A4000-memory.dmp

                                  Filesize

                                  80KB

                                • memory/1536-90-0x00007FFDC7040000-0x00007FFDC73B5000-memory.dmp

                                  Filesize

                                  3.5MB

                                • memory/1536-68-0x00007FFDDE9E0000-0x00007FFDDE9F9000-memory.dmp

                                  Filesize

                                  100KB

                                • memory/1536-64-0x00007FFDE23E0000-0x00007FFDE23EF000-memory.dmp

                                  Filesize

                                  60KB

                                • memory/1536-62-0x00007FFDD9370000-0x00007FFDD9394000-memory.dmp

                                  Filesize

                                  144KB

                                • memory/1536-54-0x00007FFDC73C0000-0x00007FFDC782E000-memory.dmp

                                  Filesize

                                  4.4MB