Malware Analysis Report

2025-05-05 21:33

Sample ID 240529-j5ktyaha32
Target nitrogenerator.exe
SHA256 441a7617caf3bdd8f1c0623d9bfc9a0c4c67354f5b94cbcb2fb75941222569c6
Tags
spyware stealer pyinstaller
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

441a7617caf3bdd8f1c0623d9bfc9a0c4c67354f5b94cbcb2fb75941222569c6

Threat Level: Shows suspicious behavior

The file nitrogenerator.exe was found to be: Shows suspicious behavior.

Malicious Activity Summary

spyware stealer pyinstaller

Loads dropped DLL

Reads user/profile data of web browsers

Detects Pyinstaller

Unsigned PE

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-29 08:15

Signatures

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-05-29 08:15

Reported

2024-05-29 08:18

Platform

win11-20240508-en

Max time kernel

146s

Max time network

159s

Command Line

"C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A

Reads user/profile data of web browsers

spyware stealer

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe

"C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe"

C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe

"C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

Network

Country Destination Domain Proto
US 52.111.229.19:443 tcp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI11642\python311.dll

MD5 58e01abc9c9b5c885635180ed104fe95
SHA1 1c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256 de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512 cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081

C:\Users\Admin\AppData\Local\Temp\_MEI11642\VCRUNTIME140.dll

MD5 49c96cecda5c6c660a107d378fdfc3d4
SHA1 00149b7a66723e3f0310f139489fe172f818ca8e
SHA256 69320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512 e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d

C:\Users\Admin\AppData\Local\Temp\_MEI11642\base_library.zip

MD5 32ede00817b1d74ce945dcd1e8505ad0
SHA1 51b5390db339feeed89bffca925896aff49c63fb
SHA256 4a73d461851b484d213684f0aadf59d537cba6fe7e75497e609d54c9f2ba5d4a
SHA512 a0e070b2ee1347e85f37e9fd589bc8484f206fa9c8f4020de147b815d2041293551e3a14a09a6eb4050cfa1f74843525377e1a99bbdcfb867b61ebddb89f21f7

C:\Users\Admin\AppData\Local\Temp\_MEI11642\_ctypes.pyd

MD5 6114277c6fc040f68d25ca90e25924cd
SHA1 028179c77cb3ba29cd8494049421eaa4900ccd0e
SHA256 f07fe92ce85f7786f96a4d59c6ee5c05fe1db63a1889ba40a67e37069639b656
SHA512 76e8ebefb9ba4ea8dcab8fce50629946af4f2b3f2f43163f75483cfb0a97968478c8aaef1d6a37be85bfc4c91a859deda6da21d3e753daefe084a203d839353d

C:\Users\Admin\AppData\Local\Temp\_MEI11642\python3.DLL

MD5 0e105f62fdd1ff4157560fe38512220b
SHA1 99bd69a94b3dc99fe2c0f7bbbcd05aa0bc8cd45c
SHA256 803ba8242b409080df166320c05a4402aab6dd30e31c4389871f4b68ca1ad423
SHA512 59c0f749ed9c59efdbcd04265b4985b1175fdd825e5a307745531ed2537397e739bc9290fdc3936cfd04f566e28bb76b878f124248b8344cf74f641c6b1101de

C:\Users\Admin\AppData\Local\Temp\_MEI11642\libffi-8.dll

MD5 0f8e4992ca92baaf54cc0b43aaccce21
SHA1 c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256 eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA512 6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

C:\Users\Admin\AppData\Local\Temp\_MEI11642\_bz2.pyd

MD5 4438affaaa0ca1df5b9b1cdaa0115ec1
SHA1 4eda79eaf3de614d5f744aa9eea5bfcf66e2d386
SHA256 ec91e2b4baca31b992d016b84b70f110ce2b1b2dfd54f5e5bef6270ed7d13b85
SHA512 6992107ac4d2108e477bc81af667b8b8e5439231e7e9f4b15ce4bce1aeea811bc0f1aaa438be3b0e38597760cb504367512809ee1937c4b538a86724ae543ba6

C:\Users\Admin\AppData\Local\Temp\_MEI11642\_lzma.pyd

MD5 737119a80303ef4eccaa998d500e7640
SHA1 328c67c6c4d297ac13da725bf24467d8b5e982e3
SHA256 7158c1290ac29169160b3ec94d9c8bcde4012d67a555f325d44b418c54e2cc28
SHA512 1c9920e0841a65b01a0b339c5f5254d1039ef9a16fe0c2484a7e2a9048727f2cc081817aa771b0c574fb8d1a5a49dc39798a3c5e5b5e64392e9c168e1827be7c

C:\Users\Admin\AppData\Local\Temp\_MEI11642\libcrypto-3.dll

MD5 7a6a8c2a8c379b111cdceb66b18d687d
SHA1 f3b8a4c731fa0145f224112f91f046fddf642794
SHA256 8e13b53ee25825b97f191d77b51ed03966f8b435773fa3fbc36f3eb668fc569b
SHA512 f2ef1702df861ef55ef397ad69985d62b675d348cab3862f6ca761f1ce3ee896f663a77d7b69b286be64e7c69be1215b03945781450b186fc02cfb1e4cb226b5

C:\Users\Admin\AppData\Local\Temp\_MEI11642\_ssl.pyd

MD5 a0b40f1f8fc6656c5637eacacf7021f6
SHA1 38813e25ffde1eee0b8154fa34af635186a243c1
SHA256 79d861f0670828dee06c2e3523e2f9a2a90d6c6996bde38201425aa4003119f1
SHA512 c18855d7c0069fff392d422e5b01fc518bbdf497eb3390c0b333ecac2497cd29abbdae4557e4f0c4e90321fba910fc3e4d235ce62b745fa34918f40fa667b713

C:\Users\Admin\AppData\Local\Temp\_MEI11642\_socket.pyd

MD5 64a6c475f59e5c57b3f4dd935f429f09
SHA1 ca2e0719dc32f22163ae0e7b53b2caadb0b9d023
SHA256 d03fa645cde89b4b01f4a2577139fbb7e1392cb91dc26213b3b76419110d8e49
SHA512 cf9e03b7b34cc095fe05c465f9d794319aaa0428fe30ab4ddce14ba78e835edf228d11ec016fd31dfe9f09d84b6f73482fb8e0f574d1fd08943c1ec9e0584973

C:\Users\Admin\AppData\Local\Temp\_MEI11642\select.pyd

MD5 653bdccb7af2aa9ccf50cb050fd3be64
SHA1 afe0a85425ae911694c250ab4cb1f6c3d3f2cc69
SHA256 e24a3e7885df9a18c29ba058c49c3adcf59e4b58107847b98eca365b6d94f279
SHA512 07e841fda7a2295380bfa05db7a4699f18c6e639da91d8ee2d126d4f96e4cddaedbd490deb4d2a2e8e5877edfff877693f67a9dc487e29742943e062d7be6277

C:\Users\Admin\AppData\Local\Temp\_MEI11642\_queue.pyd

MD5 8bbed19359892f8c95c802c6ad7598e9
SHA1 773fca164965241f63170e7a1f3a8fa17f73ea18
SHA256 4e5b7c653c1b3dc3fd7519e4f39cc8a2fb2746e0ecdc4e433fe6029f5f4d9065
SHA512 22ea7667689a9f049fa34ddae6b858e1af3e646a379d2c5a4aef3e74a4ff1a4109418b363c9be960127f1c7e020aa393a47885bc45517c9e9aebe71ec7cb61a0

C:\Users\Admin\AppData\Local\Temp\_MEI11642\_sqlite3.pyd

MD5 a7df575bf69570944b004dfe150e8caf
SHA1 2fd19be98a07347d59afd78c167601479aac94bb
SHA256 b1223420e475348c0bfb90fae33fc44ce35d988270294158ec366893df221a4b
SHA512 18c381a4ded8d33271cbf0bea75af1c86c6d34cc436f68fb9342951c071c10d84cf9f96a0509c53e5886d47fed5bca113a7f7863f6873583daa7bb6af1aa9afa

C:\Users\Admin\AppData\Local\Temp\_MEI11642\_overlapped.pyd

MD5 ac053ef737e4f13b02bfa81f9e46170b
SHA1 5d8ebeb30671b74d736731696fedc78c89da0e1f
SHA256 cb68e10748e2efd86f7495d647a2774cea9f97ad5c6fe179f90dc1c467b9280f
SHA512 6ac26f63981dc5e8dfb675880d6c43648e2bbe6711c75dcac20ebe4d8591e88fbfac3c60660ab28602352760b6f5e1cb587075072abd3333522e3e2549bfa02e

C:\Users\Admin\AppData\Local\Temp\_MEI11642\_multiprocessing.pyd

MD5 2ca9fe51bf2ee9f56f633110a08b45cd
SHA1 88ba6525c71890a50f07547a5e9ead0754dd85b9
SHA256 1d6f1e7e9f55918967a37cbd744886c2b7ee193c5fb8f948132ba40b17119a81
SHA512 821551fa1a5aa21f76c4ae05f44ddd4c2daa00329439c6dadc861931fa7bd8e464b4441dfe14383f2bb30c2fc2dfb94578927615b089a303aa39240e15e89de5

C:\Users\Admin\AppData\Local\Temp\_MEI11642\_hashlib.pyd

MD5 1524882af71247adecf5815a4e55366a
SHA1 e25014c793c53503bdff9af046140edda329d01b
SHA256 6f7742dfdd371c39048d775f37df3bc2d8d4316c9008e62347b337d64ebed327
SHA512 5b954bb7953f19aa6f7c65ad3f105b77d37077950fb1b50d9d8d337bdd4b95343bac2f4c9fe17a02d1738d1f87eeef73dbbf5cdddcb470588cbc5a63845b188a

C:\Users\Admin\AppData\Local\Temp\_MEI11642\_decimal.pyd

MD5 be315973aff9bdeb06629cd90e1a901f
SHA1 151f98d278e1f1308f2be1788c9f3b950ab88242
SHA256 0f9c6cc463611a9b2c692382fe1cdd7a52fea4733ffaf645d433f716f8bbd725
SHA512 8ea715438472e9c174dee5ece3c7d9752c31159e2d5796e5229b1df19f87316579352fc3649373db066dc537adf4869198b70b7d4d1d39ac647da2dd7cfc21e8

C:\Users\Admin\AppData\Local\Temp\_MEI11642\_cffi_backend.cp311-win_amd64.pyd

MD5 210def84bb2c35115a2b2ac25e3ffd8f
SHA1 0376b275c81c25d4df2be4789c875b31f106bd09
SHA256 59767b0918859beddf28a7d66a50431411ffd940c32b3e8347e6d938b60facdf
SHA512 cd5551eb7afd4645860c7edd7b0abd375ee6e1da934be21a6099879c8ee3812d57f2398cad28fbb6f75bba77471d9b32c96c7c1e9d3b4d26c7fc838745746c7f

C:\Users\Admin\AppData\Local\Temp\_MEI11642\_asyncio.pyd

MD5 511a52bcb0bd19eda7aa980f96723c93
SHA1 b11ab01053b76ebb60ab31049f551e5229e68ddd
SHA256 d1fb700f280e7793e9b0dca33310ef9cd08e9e0ec4f7416854dffaf6f658a394
SHA512 d29750950db2ecbd941012d7fbdd74a2bbd619f1a92616a212acb144da75880ce8a29ec3313acbc419194219b17612b27a1833074bbbaa291cdb95b05f8486ff

C:\Users\Admin\AppData\Local\Temp\_MEI11642\VCRUNTIME140_1.dll

MD5 cf0a1c4776ffe23ada5e570fc36e39fe
SHA1 2050fadecc11550ad9bde0b542bcf87e19d37f1a
SHA256 6fd366a691ed68430bcd0a3de3d8d19a0cb2102952bfc140bbef4354ed082c47
SHA512 d95cd98d22ca048d0fc5bca551c9db13d6fa705f6af120bbbb621cf2b30284bfdc7320d0a819bb26dab1e0a46253cc311a370bed4ef72ecb60c69791ed720168

C:\Users\Admin\AppData\Local\Temp\_MEI11642\unicodedata.pyd

MD5 1905b5d0f945499441e8cd58eb123d86
SHA1 117e584e6fcc0e8cfc8e24e3af527999f14bac30
SHA256 b1788b81fa160e5120451f9252c7745cdde98b8ce59bf273a3dd867bb034c532
SHA512 ed88cd7e3259239a0c8d42d95fa2447fc454a944c849fa97449ad88871236fefdafe21dbfa6e9b5d8a54ddf1d5281ec34d314cb93d47ce7b13912a69d284f522

C:\Users\Admin\AppData\Local\Temp\_MEI11642\sqlite3.dll

MD5 b49b8fde59ee4e8178c4d02404d06ee7
SHA1 1816fc83155d01351e191d583c68e722928cce40
SHA256 1afd7f650596ad97fcf358b0e077121111641c38ca9d53132bab4c9588cf262f
SHA512 a033ce87c2e503b386fb92aa79a7ec14d6c96e4a35d0cb76d4989bacd16f44c4ed5ac4e13057f05f9d199a3fd8545b9a25296515ec456f29c464d949ff34942a

C:\Users\Admin\AppData\Local\Temp\_MEI11642\pyexpat.pyd

MD5 cdcf0e74a32ad7dfeda859a0ce4fcb20
SHA1 c72b42a59ba5d83e8d481c6f05b917871b415f25
SHA256 91fe5b1b2de2847946e5b3f060678971d8127dfd7d2d37603fdcd31bd5c71197
SHA512 c26fdf57299b2c6085f1166b49bd9608d2dd8bc804034ebb03fb2bba6337206b6018bf7f74c069493ffae42f2e9d6337f6f7df5306b80b63c8c3a386bce69ea6

C:\Users\Admin\AppData\Local\Temp\_MEI11642\libssl-3.dll

MD5 64acb046fe68d64ee475e19f67253a3c
SHA1 d9e66c9437ce6f775189d6fdbd171635193ec4cc
SHA256 b21309abd3dbbb1bf8fb6aa3c250fc85d7b0d9984bf4c942d1d4421502f31a10
SHA512 f8b583981df528cf4f1854b94eff6f51dd9d4be91e6fa6329a8c4435b705457c868ae40ee030fa54bebb646a37b547bc182c9cbf0df9a07fea03a18cf85c6766

C:\Users\Admin\AppData\Local\Temp\_MEI11642\charset_normalizer\md__mypyc.cp311-win_amd64.pyd

MD5 9ea8098d31adb0f9d928759bdca39819
SHA1 e309c85c1c8e6ce049eea1f39bee654b9f98d7c5
SHA256 3d9893aa79efd13d81fcd614e9ef5fb6aad90569beeded5112de5ed5ac3cf753
SHA512 86af770f61c94dfbf074bcc4b11932bba2511caa83c223780112bda4ffb7986270dc2649d4d3ea78614dbce6f7468c8983a34966fc3f2de53055ac6b5059a707

C:\Users\Admin\AppData\Local\Temp\_MEI11642\charset_normalizer\md.cp311-win_amd64.pyd

MD5 723ec2e1404ae1047c3ef860b9840c29
SHA1 8fc869b92863fb6d2758019dd01edbef2a9a100a
SHA256 790a11aa270523c2efa6021ce4f994c3c5a67e8eaaaf02074d5308420b68bd94
SHA512 2e323ae5b816adde7aaa14398f1fdb3efe15a19df3735a604a7db6cadc22b753046eab242e0f1fbcd3310a8fbb59ff49865827d242baf21f44fd994c3ac9a878

C:\Users\Admin\AppData\Local\Temp\_MEI11642\lz4\block\_block.cp311-win_amd64.pyd

MD5 910c0ed11e93d4ef003ed0065a31164a
SHA1 ce3d5b6b289f77f95af3b60b436fbd9ce821af2f
SHA256 37c9de27ce8eb6326b57df0e0e477818fc97d6f6b9ec906f029e8e538d7133d7
SHA512 6d9a9c17b22815b3453e4ca42bc1579448b175f55cc52ece876f20699bc5da193e075e86a9b063745797f39d988c457ed56b997df023eae9f68bd31e7543f2fe

C:\Users\Admin\AppData\Local\Temp\_MEI11642\lz4\_version.cp311-win_amd64.pyd

MD5 44229b69d9ee7308da5d880081a1cb75
SHA1 aef85718a2658629a7fb399e3d4aed0001409182
SHA256 057bbddbb3f970ee2f8e0816b5fbd922f3edeb0826a1050af4277f8fd9e09a4b
SHA512 0622a64da707bcf8ee5e2ea48efacc3ebb70a4db16f50dd26dd407aafc178d0ab443651f38b67b1423c4024e5c1d339509049fb0d2c759659ab980b92d8f9f66

C:\Users\Admin\AppData\Local\Temp\_MEI11642\Cryptodome\Cipher\_raw_ecb.pyd

MD5 44c230ce2e174fe145d2f3ca318cb231
SHA1 0b629d0a91629fcee758a56b4e541e65d459f0fe
SHA256 5719f960d1204a1318b55fca410cccea750d6552ed847761927e9e29907a6e3d
SHA512 3c5b0d079989ba8c776d6a2e9a76dac5daae2a5cd921a3975ff1ee3ed9997d1d0eb6219ab15c0261abfe492a619a7173bf56eb841fa857289e2ead82947f4861

C:\Users\Admin\AppData\Local\Temp\_MEI11642\Cryptodome\Cipher\_raw_cbc.pyd

MD5 50e3dc7488f3244d215fd1379bc3bba4
SHA1 ff9d3d5ba93c1a1e45c43dde242ae28ac17349fb
SHA256 c6f3dc7c184f4604cc17dc3f3798d47b0a2d9de081082e6efaad3e65bb7a44e4
SHA512 995a4afd8603712bf7ae35a582d6a438a182ea3abc32634b6e597baa3b3a215a349d76e382b5afa296a04de4ca8172fee50eb9abcaa621bf8dc011429a088eb7

C:\Users\Admin\AppData\Local\Temp\_MEI11642\Cryptodome\Cipher\_raw_cfb.pyd

MD5 07dffcd1050e55e6b7e89180120d937b
SHA1 562a4bd8efd2258c2ed8f856f6bf968d9f531cb1
SHA256 cd4583ff141709f0e2d30203277c0d1fcb8d2afb6baf01458973e021e669a13f
SHA512 dc17b946c23263bb5f9d7e625ba257dbe4f484bc30d76fc7c08a1e2e60c9a9a6fd822e569af3e8d270c3e56c4df592d7c567ef6343e209144734eddd5174dd17

C:\Users\Admin\AppData\Local\Temp\_MEI11642\Cryptodome\Cipher\_raw_ofb.pyd

MD5 a7519e25187289e0ca5a781b2e4034a8
SHA1 8715640065b9888ddbe61e4220f4b899f31a49ae
SHA256 c297bd2e198849208622d179d5e99b1e5a693c0743272655819de2643860c42d
SHA512 00d43148b6a4833f99c968fc5e2895af2f64ed2b30fac7113a7bfa19159a00e20458a3bc277a9e16594b119d8f503261d36661a6f6b33b34d911594da8de8cc3

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-29 08:15

Reported

2024-05-29 08:17

Platform

win7-20240221-en

Max time kernel

122s

Max time network

123s

Command Line

"C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe"

Signatures

Processes

C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe

"C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe"

C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe

"C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe"

Network

N/A

Files

C:\Users\Admin\AppData\Local\Temp\_MEI22082\python311.dll

MD5 58e01abc9c9b5c885635180ed104fe95
SHA1 1c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256 de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512 cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081

Analysis: behavioral2

Detonation Overview

Submitted

2024-05-29 08:15

Reported

2024-05-29 08:17

Platform

win10-20240404-en

Max time kernel

133s

Max time network

135s

Command Line

"C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A

Reads user/profile data of web browsers

spyware stealer

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe

"C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe"

C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe

"C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

Network

Country Destination Domain Proto
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 91.65.42.20.in-addr.arpa udp
US 8.8.8.8:53 216.143.123.92.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI41082\python311.dll

MD5 58e01abc9c9b5c885635180ed104fe95
SHA1 1c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256 de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512 cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081

C:\Users\Admin\AppData\Local\Temp\_MEI41082\VCRUNTIME140.dll

MD5 49c96cecda5c6c660a107d378fdfc3d4
SHA1 00149b7a66723e3f0310f139489fe172f818ca8e
SHA256 69320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512 e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d

C:\Users\Admin\AppData\Local\Temp\_MEI41082\base_library.zip

MD5 32ede00817b1d74ce945dcd1e8505ad0
SHA1 51b5390db339feeed89bffca925896aff49c63fb
SHA256 4a73d461851b484d213684f0aadf59d537cba6fe7e75497e609d54c9f2ba5d4a
SHA512 a0e070b2ee1347e85f37e9fd589bc8484f206fa9c8f4020de147b815d2041293551e3a14a09a6eb4050cfa1f74843525377e1a99bbdcfb867b61ebddb89f21f7

\Users\Admin\AppData\Local\Temp\_MEI41082\python3.dll

MD5 0e105f62fdd1ff4157560fe38512220b
SHA1 99bd69a94b3dc99fe2c0f7bbbcd05aa0bc8cd45c
SHA256 803ba8242b409080df166320c05a4402aab6dd30e31c4389871f4b68ca1ad423
SHA512 59c0f749ed9c59efdbcd04265b4985b1175fdd825e5a307745531ed2537397e739bc9290fdc3936cfd04f566e28bb76b878f124248b8344cf74f641c6b1101de

\Users\Admin\AppData\Local\Temp\_MEI41082\_ctypes.pyd

MD5 6114277c6fc040f68d25ca90e25924cd
SHA1 028179c77cb3ba29cd8494049421eaa4900ccd0e
SHA256 f07fe92ce85f7786f96a4d59c6ee5c05fe1db63a1889ba40a67e37069639b656
SHA512 76e8ebefb9ba4ea8dcab8fce50629946af4f2b3f2f43163f75483cfb0a97968478c8aaef1d6a37be85bfc4c91a859deda6da21d3e753daefe084a203d839353d

C:\Users\Admin\AppData\Local\Temp\_MEI41082\libffi-8.dll

MD5 0f8e4992ca92baaf54cc0b43aaccce21
SHA1 c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256 eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA512 6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

\Users\Admin\AppData\Local\Temp\_MEI41082\_bz2.pyd

MD5 4438affaaa0ca1df5b9b1cdaa0115ec1
SHA1 4eda79eaf3de614d5f744aa9eea5bfcf66e2d386
SHA256 ec91e2b4baca31b992d016b84b70f110ce2b1b2dfd54f5e5bef6270ed7d13b85
SHA512 6992107ac4d2108e477bc81af667b8b8e5439231e7e9f4b15ce4bce1aeea811bc0f1aaa438be3b0e38597760cb504367512809ee1937c4b538a86724ae543ba6

\Users\Admin\AppData\Local\Temp\_MEI41082\_lzma.pyd

MD5 737119a80303ef4eccaa998d500e7640
SHA1 328c67c6c4d297ac13da725bf24467d8b5e982e3
SHA256 7158c1290ac29169160b3ec94d9c8bcde4012d67a555f325d44b418c54e2cc28
SHA512 1c9920e0841a65b01a0b339c5f5254d1039ef9a16fe0c2484a7e2a9048727f2cc081817aa771b0c574fb8d1a5a49dc39798a3c5e5b5e64392e9c168e1827be7c

C:\Users\Admin\AppData\Local\Temp\_MEI41082\libcrypto-3.dll

MD5 7a6a8c2a8c379b111cdceb66b18d687d
SHA1 f3b8a4c731fa0145f224112f91f046fddf642794
SHA256 8e13b53ee25825b97f191d77b51ed03966f8b435773fa3fbc36f3eb668fc569b
SHA512 f2ef1702df861ef55ef397ad69985d62b675d348cab3862f6ca761f1ce3ee896f663a77d7b69b286be64e7c69be1215b03945781450b186fc02cfb1e4cb226b5

C:\Users\Admin\AppData\Local\Temp\_MEI41082\pyexpat.pyd

MD5 cdcf0e74a32ad7dfeda859a0ce4fcb20
SHA1 c72b42a59ba5d83e8d481c6f05b917871b415f25
SHA256 91fe5b1b2de2847946e5b3f060678971d8127dfd7d2d37603fdcd31bd5c71197
SHA512 c26fdf57299b2c6085f1166b49bd9608d2dd8bc804034ebb03fb2bba6337206b6018bf7f74c069493ffae42f2e9d6337f6f7df5306b80b63c8c3a386bce69ea6

C:\Users\Admin\AppData\Local\Temp\_MEI41082\libssl-3.dll

MD5 64acb046fe68d64ee475e19f67253a3c
SHA1 d9e66c9437ce6f775189d6fdbd171635193ec4cc
SHA256 b21309abd3dbbb1bf8fb6aa3c250fc85d7b0d9984bf4c942d1d4421502f31a10
SHA512 f8b583981df528cf4f1854b94eff6f51dd9d4be91e6fa6329a8c4435b705457c868ae40ee030fa54bebb646a37b547bc182c9cbf0df9a07fea03a18cf85c6766

C:\Users\Admin\AppData\Local\Temp\_MEI41082\_ssl.pyd

MD5 a0b40f1f8fc6656c5637eacacf7021f6
SHA1 38813e25ffde1eee0b8154fa34af635186a243c1
SHA256 79d861f0670828dee06c2e3523e2f9a2a90d6c6996bde38201425aa4003119f1
SHA512 c18855d7c0069fff392d422e5b01fc518bbdf497eb3390c0b333ecac2497cd29abbdae4557e4f0c4e90321fba910fc3e4d235ce62b745fa34918f40fa667b713

C:\Users\Admin\AppData\Local\Temp\_MEI41082\_sqlite3.pyd

MD5 a7df575bf69570944b004dfe150e8caf
SHA1 2fd19be98a07347d59afd78c167601479aac94bb
SHA256 b1223420e475348c0bfb90fae33fc44ce35d988270294158ec366893df221a4b
SHA512 18c381a4ded8d33271cbf0bea75af1c86c6d34cc436f68fb9342951c071c10d84cf9f96a0509c53e5886d47fed5bca113a7f7863f6873583daa7bb6af1aa9afa

C:\Users\Admin\AppData\Local\Temp\_MEI41082\_socket.pyd

MD5 64a6c475f59e5c57b3f4dd935f429f09
SHA1 ca2e0719dc32f22163ae0e7b53b2caadb0b9d023
SHA256 d03fa645cde89b4b01f4a2577139fbb7e1392cb91dc26213b3b76419110d8e49
SHA512 cf9e03b7b34cc095fe05c465f9d794319aaa0428fe30ab4ddce14ba78e835edf228d11ec016fd31dfe9f09d84b6f73482fb8e0f574d1fd08943c1ec9e0584973

\Users\Admin\AppData\Local\Temp\_MEI41082\select.pyd

MD5 653bdccb7af2aa9ccf50cb050fd3be64
SHA1 afe0a85425ae911694c250ab4cb1f6c3d3f2cc69
SHA256 e24a3e7885df9a18c29ba058c49c3adcf59e4b58107847b98eca365b6d94f279
SHA512 07e841fda7a2295380bfa05db7a4699f18c6e639da91d8ee2d126d4f96e4cddaedbd490deb4d2a2e8e5877edfff877693f67a9dc487e29742943e062d7be6277

C:\Users\Admin\AppData\Local\Temp\_MEI41082\_queue.pyd

MD5 8bbed19359892f8c95c802c6ad7598e9
SHA1 773fca164965241f63170e7a1f3a8fa17f73ea18
SHA256 4e5b7c653c1b3dc3fd7519e4f39cc8a2fb2746e0ecdc4e433fe6029f5f4d9065
SHA512 22ea7667689a9f049fa34ddae6b858e1af3e646a379d2c5a4aef3e74a4ff1a4109418b363c9be960127f1c7e020aa393a47885bc45517c9e9aebe71ec7cb61a0

C:\Users\Admin\AppData\Local\Temp\_MEI41082\_overlapped.pyd

MD5 ac053ef737e4f13b02bfa81f9e46170b
SHA1 5d8ebeb30671b74d736731696fedc78c89da0e1f
SHA256 cb68e10748e2efd86f7495d647a2774cea9f97ad5c6fe179f90dc1c467b9280f
SHA512 6ac26f63981dc5e8dfb675880d6c43648e2bbe6711c75dcac20ebe4d8591e88fbfac3c60660ab28602352760b6f5e1cb587075072abd3333522e3e2549bfa02e

C:\Users\Admin\AppData\Local\Temp\_MEI41082\_multiprocessing.pyd

MD5 2ca9fe51bf2ee9f56f633110a08b45cd
SHA1 88ba6525c71890a50f07547a5e9ead0754dd85b9
SHA256 1d6f1e7e9f55918967a37cbd744886c2b7ee193c5fb8f948132ba40b17119a81
SHA512 821551fa1a5aa21f76c4ae05f44ddd4c2daa00329439c6dadc861931fa7bd8e464b4441dfe14383f2bb30c2fc2dfb94578927615b089a303aa39240e15e89de5

C:\Users\Admin\AppData\Local\Temp\_MEI41082\_hashlib.pyd

MD5 1524882af71247adecf5815a4e55366a
SHA1 e25014c793c53503bdff9af046140edda329d01b
SHA256 6f7742dfdd371c39048d775f37df3bc2d8d4316c9008e62347b337d64ebed327
SHA512 5b954bb7953f19aa6f7c65ad3f105b77d37077950fb1b50d9d8d337bdd4b95343bac2f4c9fe17a02d1738d1f87eeef73dbbf5cdddcb470588cbc5a63845b188a

C:\Users\Admin\AppData\Local\Temp\_MEI41082\_decimal.pyd

MD5 be315973aff9bdeb06629cd90e1a901f
SHA1 151f98d278e1f1308f2be1788c9f3b950ab88242
SHA256 0f9c6cc463611a9b2c692382fe1cdd7a52fea4733ffaf645d433f716f8bbd725
SHA512 8ea715438472e9c174dee5ece3c7d9752c31159e2d5796e5229b1df19f87316579352fc3649373db066dc537adf4869198b70b7d4d1d39ac647da2dd7cfc21e8

C:\Users\Admin\AppData\Local\Temp\_MEI41082\_cffi_backend.cp311-win_amd64.pyd

MD5 210def84bb2c35115a2b2ac25e3ffd8f
SHA1 0376b275c81c25d4df2be4789c875b31f106bd09
SHA256 59767b0918859beddf28a7d66a50431411ffd940c32b3e8347e6d938b60facdf
SHA512 cd5551eb7afd4645860c7edd7b0abd375ee6e1da934be21a6099879c8ee3812d57f2398cad28fbb6f75bba77471d9b32c96c7c1e9d3b4d26c7fc838745746c7f

C:\Users\Admin\AppData\Local\Temp\_MEI41082\_asyncio.pyd

MD5 511a52bcb0bd19eda7aa980f96723c93
SHA1 b11ab01053b76ebb60ab31049f551e5229e68ddd
SHA256 d1fb700f280e7793e9b0dca33310ef9cd08e9e0ec4f7416854dffaf6f658a394
SHA512 d29750950db2ecbd941012d7fbdd74a2bbd619f1a92616a212acb144da75880ce8a29ec3313acbc419194219b17612b27a1833074bbbaa291cdb95b05f8486ff

C:\Users\Admin\AppData\Local\Temp\_MEI41082\VCRUNTIME140_1.dll

MD5 cf0a1c4776ffe23ada5e570fc36e39fe
SHA1 2050fadecc11550ad9bde0b542bcf87e19d37f1a
SHA256 6fd366a691ed68430bcd0a3de3d8d19a0cb2102952bfc140bbef4354ed082c47
SHA512 d95cd98d22ca048d0fc5bca551c9db13d6fa705f6af120bbbb621cf2b30284bfdc7320d0a819bb26dab1e0a46253cc311a370bed4ef72ecb60c69791ed720168

C:\Users\Admin\AppData\Local\Temp\_MEI41082\unicodedata.pyd

MD5 1905b5d0f945499441e8cd58eb123d86
SHA1 117e584e6fcc0e8cfc8e24e3af527999f14bac30
SHA256 b1788b81fa160e5120451f9252c7745cdde98b8ce59bf273a3dd867bb034c532
SHA512 ed88cd7e3259239a0c8d42d95fa2447fc454a944c849fa97449ad88871236fefdafe21dbfa6e9b5d8a54ddf1d5281ec34d314cb93d47ce7b13912a69d284f522

C:\Users\Admin\AppData\Local\Temp\_MEI41082\sqlite3.dll

MD5 b49b8fde59ee4e8178c4d02404d06ee7
SHA1 1816fc83155d01351e191d583c68e722928cce40
SHA256 1afd7f650596ad97fcf358b0e077121111641c38ca9d53132bab4c9588cf262f
SHA512 a033ce87c2e503b386fb92aa79a7ec14d6c96e4a35d0cb76d4989bacd16f44c4ed5ac4e13057f05f9d199a3fd8545b9a25296515ec456f29c464d949ff34942a

\Users\Admin\AppData\Local\Temp\_MEI41082\charset_normalizer\md.cp311-win_amd64.pyd

MD5 723ec2e1404ae1047c3ef860b9840c29
SHA1 8fc869b92863fb6d2758019dd01edbef2a9a100a
SHA256 790a11aa270523c2efa6021ce4f994c3c5a67e8eaaaf02074d5308420b68bd94
SHA512 2e323ae5b816adde7aaa14398f1fdb3efe15a19df3735a604a7db6cadc22b753046eab242e0f1fbcd3310a8fbb59ff49865827d242baf21f44fd994c3ac9a878

\Users\Admin\AppData\Local\Temp\_MEI41082\charset_normalizer\md__mypyc.cp311-win_amd64.pyd

MD5 9ea8098d31adb0f9d928759bdca39819
SHA1 e309c85c1c8e6ce049eea1f39bee654b9f98d7c5
SHA256 3d9893aa79efd13d81fcd614e9ef5fb6aad90569beeded5112de5ed5ac3cf753
SHA512 86af770f61c94dfbf074bcc4b11932bba2511caa83c223780112bda4ffb7986270dc2649d4d3ea78614dbce6f7468c8983a34966fc3f2de53055ac6b5059a707

\Users\Admin\AppData\Local\Temp\_MEI41082\lz4\_version.cp311-win_amd64.pyd

MD5 44229b69d9ee7308da5d880081a1cb75
SHA1 aef85718a2658629a7fb399e3d4aed0001409182
SHA256 057bbddbb3f970ee2f8e0816b5fbd922f3edeb0826a1050af4277f8fd9e09a4b
SHA512 0622a64da707bcf8ee5e2ea48efacc3ebb70a4db16f50dd26dd407aafc178d0ab443651f38b67b1423c4024e5c1d339509049fb0d2c759659ab980b92d8f9f66

C:\Users\Admin\AppData\Local\Temp\_MEI41082\lz4\block\_block.cp311-win_amd64.pyd

MD5 910c0ed11e93d4ef003ed0065a31164a
SHA1 ce3d5b6b289f77f95af3b60b436fbd9ce821af2f
SHA256 37c9de27ce8eb6326b57df0e0e477818fc97d6f6b9ec906f029e8e538d7133d7
SHA512 6d9a9c17b22815b3453e4ca42bc1579448b175f55cc52ece876f20699bc5da193e075e86a9b063745797f39d988c457ed56b997df023eae9f68bd31e7543f2fe

\Users\Admin\AppData\Local\Temp\_MEI41082\Cryptodome\Cipher\_raw_ecb.pyd

MD5 44c230ce2e174fe145d2f3ca318cb231
SHA1 0b629d0a91629fcee758a56b4e541e65d459f0fe
SHA256 5719f960d1204a1318b55fca410cccea750d6552ed847761927e9e29907a6e3d
SHA512 3c5b0d079989ba8c776d6a2e9a76dac5daae2a5cd921a3975ff1ee3ed9997d1d0eb6219ab15c0261abfe492a619a7173bf56eb841fa857289e2ead82947f4861

\Users\Admin\AppData\Local\Temp\_MEI41082\Cryptodome\Cipher\_raw_ofb.pyd

MD5 a7519e25187289e0ca5a781b2e4034a8
SHA1 8715640065b9888ddbe61e4220f4b899f31a49ae
SHA256 c297bd2e198849208622d179d5e99b1e5a693c0743272655819de2643860c42d
SHA512 00d43148b6a4833f99c968fc5e2895af2f64ed2b30fac7113a7bfa19159a00e20458a3bc277a9e16594b119d8f503261d36661a6f6b33b34d911594da8de8cc3

\Users\Admin\AppData\Local\Temp\_MEI41082\Cryptodome\Cipher\_raw_cfb.pyd

MD5 07dffcd1050e55e6b7e89180120d937b
SHA1 562a4bd8efd2258c2ed8f856f6bf968d9f531cb1
SHA256 cd4583ff141709f0e2d30203277c0d1fcb8d2afb6baf01458973e021e669a13f
SHA512 dc17b946c23263bb5f9d7e625ba257dbe4f484bc30d76fc7c08a1e2e60c9a9a6fd822e569af3e8d270c3e56c4df592d7c567ef6343e209144734eddd5174dd17

\Users\Admin\AppData\Local\Temp\_MEI41082\Cryptodome\Cipher\_raw_cbc.pyd

MD5 50e3dc7488f3244d215fd1379bc3bba4
SHA1 ff9d3d5ba93c1a1e45c43dde242ae28ac17349fb
SHA256 c6f3dc7c184f4604cc17dc3f3798d47b0a2d9de081082e6efaad3e65bb7a44e4
SHA512 995a4afd8603712bf7ae35a582d6a438a182ea3abc32634b6e597baa3b3a215a349d76e382b5afa296a04de4ca8172fee50eb9abcaa621bf8dc011429a088eb7

Analysis: behavioral3

Detonation Overview

Submitted

2024-05-29 08:15

Reported

2024-05-29 08:17

Platform

win10v2004-20240508-en

Max time kernel

149s

Max time network

150s

Command Line

"C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe"

Signatures

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A

Reads user/profile data of web browsers

spyware stealer

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe

"C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe"

C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe

"C:\Users\Admin\AppData\Local\Temp\nitrogenerator.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 172.210.232.199.in-addr.arpa udp
NL 23.62.61.145:443 www.bing.com tcp
US 8.8.8.8:53 145.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 91.90.14.23.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 169.117.168.52.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\_MEI37842\python311.dll

MD5 58e01abc9c9b5c885635180ed104fe95
SHA1 1c2f7216b125539d63bd111a7aba615c69deb8ba
SHA256 de1b95d2e951fc048c84684bc7df4346138910544ee335b61fc8e65f360c3837
SHA512 cd32c77191309d99aeed47699501b357b35669123f0dd70ed97c3791a009d1855ab27162db24a4bd9e719b68ee3b0539ee6db88e71abb9a2d4d629f87bc2c081

C:\Users\Admin\AppData\Local\Temp\_MEI37842\VCRUNTIME140.dll

MD5 49c96cecda5c6c660a107d378fdfc3d4
SHA1 00149b7a66723e3f0310f139489fe172f818ca8e
SHA256 69320f278d90efaaeb67e2a1b55e5b0543883125834c812c8d9c39676e0494fc
SHA512 e09e072f3095379b0c921d41d6e64f4f1cd78400594a2317cfb5e5dca03dedb5a8239ed89905c9e967d1acb376b0585a35addf6648422c7ddb472ce38b1ba60d

C:\Users\Admin\AppData\Local\Temp\_MEI37842\python3.DLL

MD5 0e105f62fdd1ff4157560fe38512220b
SHA1 99bd69a94b3dc99fe2c0f7bbbcd05aa0bc8cd45c
SHA256 803ba8242b409080df166320c05a4402aab6dd30e31c4389871f4b68ca1ad423
SHA512 59c0f749ed9c59efdbcd04265b4985b1175fdd825e5a307745531ed2537397e739bc9290fdc3936cfd04f566e28bb76b878f124248b8344cf74f641c6b1101de

C:\Users\Admin\AppData\Local\Temp\_MEI37842\_ctypes.pyd

MD5 6114277c6fc040f68d25ca90e25924cd
SHA1 028179c77cb3ba29cd8494049421eaa4900ccd0e
SHA256 f07fe92ce85f7786f96a4d59c6ee5c05fe1db63a1889ba40a67e37069639b656
SHA512 76e8ebefb9ba4ea8dcab8fce50629946af4f2b3f2f43163f75483cfb0a97968478c8aaef1d6a37be85bfc4c91a859deda6da21d3e753daefe084a203d839353d

C:\Users\Admin\AppData\Local\Temp\_MEI37842\libffi-8.dll

MD5 0f8e4992ca92baaf54cc0b43aaccce21
SHA1 c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256 eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA512 6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

C:\Users\Admin\AppData\Local\Temp\_MEI37842\_bz2.pyd

MD5 4438affaaa0ca1df5b9b1cdaa0115ec1
SHA1 4eda79eaf3de614d5f744aa9eea5bfcf66e2d386
SHA256 ec91e2b4baca31b992d016b84b70f110ce2b1b2dfd54f5e5bef6270ed7d13b85
SHA512 6992107ac4d2108e477bc81af667b8b8e5439231e7e9f4b15ce4bce1aeea811bc0f1aaa438be3b0e38597760cb504367512809ee1937c4b538a86724ae543ba6

C:\Users\Admin\AppData\Local\Temp\_MEI37842\_lzma.pyd

MD5 737119a80303ef4eccaa998d500e7640
SHA1 328c67c6c4d297ac13da725bf24467d8b5e982e3
SHA256 7158c1290ac29169160b3ec94d9c8bcde4012d67a555f325d44b418c54e2cc28
SHA512 1c9920e0841a65b01a0b339c5f5254d1039ef9a16fe0c2484a7e2a9048727f2cc081817aa771b0c574fb8d1a5a49dc39798a3c5e5b5e64392e9c168e1827be7c

C:\Users\Admin\AppData\Local\Temp\_MEI37842\_ssl.pyd

MD5 a0b40f1f8fc6656c5637eacacf7021f6
SHA1 38813e25ffde1eee0b8154fa34af635186a243c1
SHA256 79d861f0670828dee06c2e3523e2f9a2a90d6c6996bde38201425aa4003119f1
SHA512 c18855d7c0069fff392d422e5b01fc518bbdf497eb3390c0b333ecac2497cd29abbdae4557e4f0c4e90321fba910fc3e4d235ce62b745fa34918f40fa667b713

C:\Users\Admin\AppData\Local\Temp\_MEI37842\_sqlite3.pyd

MD5 a7df575bf69570944b004dfe150e8caf
SHA1 2fd19be98a07347d59afd78c167601479aac94bb
SHA256 b1223420e475348c0bfb90fae33fc44ce35d988270294158ec366893df221a4b
SHA512 18c381a4ded8d33271cbf0bea75af1c86c6d34cc436f68fb9342951c071c10d84cf9f96a0509c53e5886d47fed5bca113a7f7863f6873583daa7bb6af1aa9afa

C:\Users\Admin\AppData\Local\Temp\_MEI37842\_socket.pyd

MD5 64a6c475f59e5c57b3f4dd935f429f09
SHA1 ca2e0719dc32f22163ae0e7b53b2caadb0b9d023
SHA256 d03fa645cde89b4b01f4a2577139fbb7e1392cb91dc26213b3b76419110d8e49
SHA512 cf9e03b7b34cc095fe05c465f9d794319aaa0428fe30ab4ddce14ba78e835edf228d11ec016fd31dfe9f09d84b6f73482fb8e0f574d1fd08943c1ec9e0584973

C:\Users\Admin\AppData\Local\Temp\_MEI37842\_queue.pyd

MD5 8bbed19359892f8c95c802c6ad7598e9
SHA1 773fca164965241f63170e7a1f3a8fa17f73ea18
SHA256 4e5b7c653c1b3dc3fd7519e4f39cc8a2fb2746e0ecdc4e433fe6029f5f4d9065
SHA512 22ea7667689a9f049fa34ddae6b858e1af3e646a379d2c5a4aef3e74a4ff1a4109418b363c9be960127f1c7e020aa393a47885bc45517c9e9aebe71ec7cb61a0

C:\Users\Admin\AppData\Local\Temp\_MEI37842\_overlapped.pyd

MD5 ac053ef737e4f13b02bfa81f9e46170b
SHA1 5d8ebeb30671b74d736731696fedc78c89da0e1f
SHA256 cb68e10748e2efd86f7495d647a2774cea9f97ad5c6fe179f90dc1c467b9280f
SHA512 6ac26f63981dc5e8dfb675880d6c43648e2bbe6711c75dcac20ebe4d8591e88fbfac3c60660ab28602352760b6f5e1cb587075072abd3333522e3e2549bfa02e

C:\Users\Admin\AppData\Local\Temp\_MEI37842\_multiprocessing.pyd

MD5 2ca9fe51bf2ee9f56f633110a08b45cd
SHA1 88ba6525c71890a50f07547a5e9ead0754dd85b9
SHA256 1d6f1e7e9f55918967a37cbd744886c2b7ee193c5fb8f948132ba40b17119a81
SHA512 821551fa1a5aa21f76c4ae05f44ddd4c2daa00329439c6dadc861931fa7bd8e464b4441dfe14383f2bb30c2fc2dfb94578927615b089a303aa39240e15e89de5

C:\Users\Admin\AppData\Local\Temp\_MEI37842\_hashlib.pyd

MD5 1524882af71247adecf5815a4e55366a
SHA1 e25014c793c53503bdff9af046140edda329d01b
SHA256 6f7742dfdd371c39048d775f37df3bc2d8d4316c9008e62347b337d64ebed327
SHA512 5b954bb7953f19aa6f7c65ad3f105b77d37077950fb1b50d9d8d337bdd4b95343bac2f4c9fe17a02d1738d1f87eeef73dbbf5cdddcb470588cbc5a63845b188a

C:\Users\Admin\AppData\Local\Temp\_MEI37842\_decimal.pyd

MD5 be315973aff9bdeb06629cd90e1a901f
SHA1 151f98d278e1f1308f2be1788c9f3b950ab88242
SHA256 0f9c6cc463611a9b2c692382fe1cdd7a52fea4733ffaf645d433f716f8bbd725
SHA512 8ea715438472e9c174dee5ece3c7d9752c31159e2d5796e5229b1df19f87316579352fc3649373db066dc537adf4869198b70b7d4d1d39ac647da2dd7cfc21e8

C:\Users\Admin\AppData\Local\Temp\_MEI37842\_cffi_backend.cp311-win_amd64.pyd

MD5 210def84bb2c35115a2b2ac25e3ffd8f
SHA1 0376b275c81c25d4df2be4789c875b31f106bd09
SHA256 59767b0918859beddf28a7d66a50431411ffd940c32b3e8347e6d938b60facdf
SHA512 cd5551eb7afd4645860c7edd7b0abd375ee6e1da934be21a6099879c8ee3812d57f2398cad28fbb6f75bba77471d9b32c96c7c1e9d3b4d26c7fc838745746c7f

C:\Users\Admin\AppData\Local\Temp\_MEI37842\_asyncio.pyd

MD5 511a52bcb0bd19eda7aa980f96723c93
SHA1 b11ab01053b76ebb60ab31049f551e5229e68ddd
SHA256 d1fb700f280e7793e9b0dca33310ef9cd08e9e0ec4f7416854dffaf6f658a394
SHA512 d29750950db2ecbd941012d7fbdd74a2bbd619f1a92616a212acb144da75880ce8a29ec3313acbc419194219b17612b27a1833074bbbaa291cdb95b05f8486ff

C:\Users\Admin\AppData\Local\Temp\_MEI37842\VCRUNTIME140_1.dll

MD5 cf0a1c4776ffe23ada5e570fc36e39fe
SHA1 2050fadecc11550ad9bde0b542bcf87e19d37f1a
SHA256 6fd366a691ed68430bcd0a3de3d8d19a0cb2102952bfc140bbef4354ed082c47
SHA512 d95cd98d22ca048d0fc5bca551c9db13d6fa705f6af120bbbb621cf2b30284bfdc7320d0a819bb26dab1e0a46253cc311a370bed4ef72ecb60c69791ed720168

C:\Users\Admin\AppData\Local\Temp\_MEI37842\unicodedata.pyd

MD5 1905b5d0f945499441e8cd58eb123d86
SHA1 117e584e6fcc0e8cfc8e24e3af527999f14bac30
SHA256 b1788b81fa160e5120451f9252c7745cdde98b8ce59bf273a3dd867bb034c532
SHA512 ed88cd7e3259239a0c8d42d95fa2447fc454a944c849fa97449ad88871236fefdafe21dbfa6e9b5d8a54ddf1d5281ec34d314cb93d47ce7b13912a69d284f522

C:\Users\Admin\AppData\Local\Temp\_MEI37842\sqlite3.dll

MD5 b49b8fde59ee4e8178c4d02404d06ee7
SHA1 1816fc83155d01351e191d583c68e722928cce40
SHA256 1afd7f650596ad97fcf358b0e077121111641c38ca9d53132bab4c9588cf262f
SHA512 a033ce87c2e503b386fb92aa79a7ec14d6c96e4a35d0cb76d4989bacd16f44c4ed5ac4e13057f05f9d199a3fd8545b9a25296515ec456f29c464d949ff34942a

C:\Users\Admin\AppData\Local\Temp\_MEI37842\select.pyd

MD5 653bdccb7af2aa9ccf50cb050fd3be64
SHA1 afe0a85425ae911694c250ab4cb1f6c3d3f2cc69
SHA256 e24a3e7885df9a18c29ba058c49c3adcf59e4b58107847b98eca365b6d94f279
SHA512 07e841fda7a2295380bfa05db7a4699f18c6e639da91d8ee2d126d4f96e4cddaedbd490deb4d2a2e8e5877edfff877693f67a9dc487e29742943e062d7be6277

C:\Users\Admin\AppData\Local\Temp\_MEI37842\pyexpat.pyd

MD5 cdcf0e74a32ad7dfeda859a0ce4fcb20
SHA1 c72b42a59ba5d83e8d481c6f05b917871b415f25
SHA256 91fe5b1b2de2847946e5b3f060678971d8127dfd7d2d37603fdcd31bd5c71197
SHA512 c26fdf57299b2c6085f1166b49bd9608d2dd8bc804034ebb03fb2bba6337206b6018bf7f74c069493ffae42f2e9d6337f6f7df5306b80b63c8c3a386bce69ea6

C:\Users\Admin\AppData\Local\Temp\_MEI37842\libssl-3.dll

MD5 64acb046fe68d64ee475e19f67253a3c
SHA1 d9e66c9437ce6f775189d6fdbd171635193ec4cc
SHA256 b21309abd3dbbb1bf8fb6aa3c250fc85d7b0d9984bf4c942d1d4421502f31a10
SHA512 f8b583981df528cf4f1854b94eff6f51dd9d4be91e6fa6329a8c4435b705457c868ae40ee030fa54bebb646a37b547bc182c9cbf0df9a07fea03a18cf85c6766

C:\Users\Admin\AppData\Local\Temp\_MEI37842\libcrypto-3.dll

MD5 7a6a8c2a8c379b111cdceb66b18d687d
SHA1 f3b8a4c731fa0145f224112f91f046fddf642794
SHA256 8e13b53ee25825b97f191d77b51ed03966f8b435773fa3fbc36f3eb668fc569b
SHA512 f2ef1702df861ef55ef397ad69985d62b675d348cab3862f6ca761f1ce3ee896f663a77d7b69b286be64e7c69be1215b03945781450b186fc02cfb1e4cb226b5

C:\Users\Admin\AppData\Local\Temp\_MEI37842\base_library.zip

MD5 32ede00817b1d74ce945dcd1e8505ad0
SHA1 51b5390db339feeed89bffca925896aff49c63fb
SHA256 4a73d461851b484d213684f0aadf59d537cba6fe7e75497e609d54c9f2ba5d4a
SHA512 a0e070b2ee1347e85f37e9fd589bc8484f206fa9c8f4020de147b815d2041293551e3a14a09a6eb4050cfa1f74843525377e1a99bbdcfb867b61ebddb89f21f7

C:\Users\Admin\AppData\Local\Temp\_MEI37842\charset_normalizer\md.cp311-win_amd64.pyd

MD5 723ec2e1404ae1047c3ef860b9840c29
SHA1 8fc869b92863fb6d2758019dd01edbef2a9a100a
SHA256 790a11aa270523c2efa6021ce4f994c3c5a67e8eaaaf02074d5308420b68bd94
SHA512 2e323ae5b816adde7aaa14398f1fdb3efe15a19df3735a604a7db6cadc22b753046eab242e0f1fbcd3310a8fbb59ff49865827d242baf21f44fd994c3ac9a878

C:\Users\Admin\AppData\Local\Temp\_MEI37842\charset_normalizer\md__mypyc.cp311-win_amd64.pyd

MD5 9ea8098d31adb0f9d928759bdca39819
SHA1 e309c85c1c8e6ce049eea1f39bee654b9f98d7c5
SHA256 3d9893aa79efd13d81fcd614e9ef5fb6aad90569beeded5112de5ed5ac3cf753
SHA512 86af770f61c94dfbf074bcc4b11932bba2511caa83c223780112bda4ffb7986270dc2649d4d3ea78614dbce6f7468c8983a34966fc3f2de53055ac6b5059a707

C:\Users\Admin\AppData\Local\Temp\_MEI37842\lz4\block\_block.cp311-win_amd64.pyd

MD5 910c0ed11e93d4ef003ed0065a31164a
SHA1 ce3d5b6b289f77f95af3b60b436fbd9ce821af2f
SHA256 37c9de27ce8eb6326b57df0e0e477818fc97d6f6b9ec906f029e8e538d7133d7
SHA512 6d9a9c17b22815b3453e4ca42bc1579448b175f55cc52ece876f20699bc5da193e075e86a9b063745797f39d988c457ed56b997df023eae9f68bd31e7543f2fe

C:\Users\Admin\AppData\Local\Temp\_MEI37842\lz4\_version.cp311-win_amd64.pyd

MD5 44229b69d9ee7308da5d880081a1cb75
SHA1 aef85718a2658629a7fb399e3d4aed0001409182
SHA256 057bbddbb3f970ee2f8e0816b5fbd922f3edeb0826a1050af4277f8fd9e09a4b
SHA512 0622a64da707bcf8ee5e2ea48efacc3ebb70a4db16f50dd26dd407aafc178d0ab443651f38b67b1423c4024e5c1d339509049fb0d2c759659ab980b92d8f9f66

C:\Users\Admin\AppData\Local\Temp\_MEI37842\Cryptodome\Cipher\_raw_ecb.pyd

MD5 44c230ce2e174fe145d2f3ca318cb231
SHA1 0b629d0a91629fcee758a56b4e541e65d459f0fe
SHA256 5719f960d1204a1318b55fca410cccea750d6552ed847761927e9e29907a6e3d
SHA512 3c5b0d079989ba8c776d6a2e9a76dac5daae2a5cd921a3975ff1ee3ed9997d1d0eb6219ab15c0261abfe492a619a7173bf56eb841fa857289e2ead82947f4861

C:\Users\Admin\AppData\Local\Temp\_MEI37842\Cryptodome\Cipher\_raw_cbc.pyd

MD5 50e3dc7488f3244d215fd1379bc3bba4
SHA1 ff9d3d5ba93c1a1e45c43dde242ae28ac17349fb
SHA256 c6f3dc7c184f4604cc17dc3f3798d47b0a2d9de081082e6efaad3e65bb7a44e4
SHA512 995a4afd8603712bf7ae35a582d6a438a182ea3abc32634b6e597baa3b3a215a349d76e382b5afa296a04de4ca8172fee50eb9abcaa621bf8dc011429a088eb7

C:\Users\Admin\AppData\Local\Temp\_MEI37842\Cryptodome\Cipher\_raw_cfb.pyd

MD5 07dffcd1050e55e6b7e89180120d937b
SHA1 562a4bd8efd2258c2ed8f856f6bf968d9f531cb1
SHA256 cd4583ff141709f0e2d30203277c0d1fcb8d2afb6baf01458973e021e669a13f
SHA512 dc17b946c23263bb5f9d7e625ba257dbe4f484bc30d76fc7c08a1e2e60c9a9a6fd822e569af3e8d270c3e56c4df592d7c567ef6343e209144734eddd5174dd17

C:\Users\Admin\AppData\Local\Temp\_MEI37842\Cryptodome\Cipher\_raw_ofb.pyd

MD5 a7519e25187289e0ca5a781b2e4034a8
SHA1 8715640065b9888ddbe61e4220f4b899f31a49ae
SHA256 c297bd2e198849208622d179d5e99b1e5a693c0743272655819de2643860c42d
SHA512 00d43148b6a4833f99c968fc5e2895af2f64ed2b30fac7113a7bfa19159a00e20458a3bc277a9e16594b119d8f503261d36661a6f6b33b34d911594da8de8cc3