Analysis Overview
SHA256
528cd3a29332df4d79202214ce24768eab6f2535c81b586ddba6e0708332b9d8
Threat Level: Known bad
The file Blum.exe was found to be: Known bad.
Malicious Activity Summary
Xworm
Detect Xworm Payload
Command and Scripting Interpreter: PowerShell
Reads user/profile data of web browsers
Executes dropped EXE
Drops startup file
Loads dropped DLL
Looks up external IP address via web service
Adds Run key to start application
Detects Pyinstaller
Enumerates physical storage devices
Unsigned PE
Uses Task Scheduler COM API
Suspicious use of SetWindowsHookEx
Suspicious behavior: EnumeratesProcesses
Modifies registry class
Suspicious use of AdjustPrivilegeToken
Creates scheduled task(s)
Suspicious use of WriteProcessMemory
Suspicious behavior: AddClipboardFormatListener
MITRE ATT&CK Matrix V13
Analysis: static1
Detonation Overview
Reported
2024-06-10 12:01
Signatures
Detects Pyinstaller
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Analysis: behavioral1
Detonation Overview
Submitted
2024-06-10 12:01
Reported
2024-06-10 12:04
Platform
win10-20240404-en
Max time kernel
147s
Max time network
158s
Command Line
Signatures
Detect Xworm Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Xworm
Command and Scripting Interpreter: PowerShell
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
| N/A | N/A | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | N/A |
Drops startup file
| Description | Indicator | Process | Target |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe | C:\Users\Admin\AppData\Local\Temp\Blum.exe | N/A |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe | C:\Users\Admin\AppData\Local\Temp\Blum.exe | N/A |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecurityHealthSystray.lnk | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecurityHealthSystray.lnk | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe | N/A |
| File created | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.lnk | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe | N/A |
| File opened for modification | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.lnk | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Blum clicker.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Blum clicker new bild.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe | N/A |
| N/A | N/A | C:\providerIntocommon\comReviewIntodll.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Telegram.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Telegram.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe | N/A |
Loads dropped DLL
Reads user/profile data of web browsers
Adds Run key to start application
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000\Software\Microsoft\Windows\CurrentVersion\Run\Telegram = "C:\\Users\\Admin\\AppData\\Roaming\\Telegram.exe" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Users\\Admin\\AppData\\Roaming\\SecurityHealthSystray.exe" | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe | N/A |
Looks up external IP address via web service
| Description | Indicator | Process | Target |
| N/A | ip-api.com | N/A | N/A |
Enumerates physical storage devices
Creates scheduled task(s)
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\System32\schtasks.exe | N/A |
| N/A | N/A | C:\Windows\System32\schtasks.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings | C:\Users\Admin\AppData\Local\Temp\Blum clicker new bild.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings | C:\providerIntocommon\comReviewIntodll.exe | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe | N/A |
Suspicious use of WriteProcessMemory
Uses Task Scheduler COM API
Processes
C:\Users\Admin\AppData\Local\Temp\Blum.exe
"C:\Users\Admin\AppData\Local\Temp\Blum.exe"
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe
"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe"
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe
"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe"
C:\Users\Admin\AppData\Local\Temp\Blum clicker.exe
"C:\Users\Admin\AppData\Local\Temp\Blum clicker.exe"
C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe
"C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe"
C:\Users\Admin\AppData\Local\Temp\Blum clicker new bild.exe
"C:\Users\Admin\AppData\Local\Temp\Blum clicker new bild.exe"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe'
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe'
C:\Windows\SysWOW64\WScript.exe
"C:\Windows\System32\WScript.exe" "C:\providerIntocommon\ZXmSvOcZ6hi4BoeMfr8lLzFjNRFijC4aZDJODcT3u.vbe"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Telegram.exe'
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe'
C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe
"C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe"
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe'
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Telegram.exe'
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SecurityHealthSystray.exe'
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Telegram.exe'
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SecurityHealthSystray" /tr "C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe"
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\providerIntocommon\AL7pCLVlantRsaAqsU.bat" "
C:\providerIntocommon\comReviewIntodll.exe
"C:\providerIntocommon/comReviewIntodll.exe"
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Telegram" /tr "C:\Users\Admin\AppData\Roaming\Telegram.exe"
C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe
C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe
C:\Users\Admin\AppData\Roaming\Telegram.exe
C:\Users\Admin\AppData\Roaming\Telegram.exe
C:\Users\Admin\AppData\Roaming\Telegram.exe
C:\Users\Admin\AppData\Roaming\Telegram.exe
C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe
C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WPmuDeaX4D.bat"
C:\Windows\system32\chcp.com
chcp 65001
C:\Windows\system32\w32tm.exe
w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | ip-api.com | udp |
| US | 208.95.112.1:80 | ip-api.com | tcp |
| US | 208.95.112.1:80 | ip-api.com | tcp |
| US | 8.8.8.8:53 | 1.112.95.208.in-addr.arpa | udp |
| US | 8.8.8.8:53 | api.telegram.org | udp |
| NL | 149.154.167.220:443 | api.telegram.org | tcp |
| US | 8.8.8.8:53 | 220.167.154.149.in-addr.arpa | udp |
| US | 8.8.8.8:53 | api.telegram.org | udp |
| NL | 149.154.167.220:443 | api.telegram.org | tcp |
| GB | 38.180.165.153:80 | 38.180.165.153 | tcp |
| GB | 38.180.165.153:80 | 38.180.165.153 | tcp |
| US | 8.8.8.8:53 | being-nike.gl.at.ply.gg | udp |
| US | 147.185.221.19:16368 | being-nike.gl.at.ply.gg | tcp |
| US | 147.185.221.19:16368 | being-nike.gl.at.ply.gg | tcp |
| US | 8.8.8.8:53 | 153.165.180.38.in-addr.arpa | udp |
| US | 147.185.221.19:16368 | being-nike.gl.at.ply.gg | tcp |
| US | 147.185.221.19:16368 | being-nike.gl.at.ply.gg | tcp |
| US | 8.8.8.8:53 | 22.236.111.52.in-addr.arpa | udp |
| US | 147.185.221.19:16368 | being-nike.gl.at.ply.gg | tcp |
| US | 147.185.221.19:16368 | being-nike.gl.at.ply.gg | tcp |
| US | 147.185.221.19:16368 | being-nike.gl.at.ply.gg | tcp |
| US | 147.185.221.19:16368 | being-nike.gl.at.ply.gg | tcp |
| US | 147.185.221.19:16368 | being-nike.gl.at.ply.gg | tcp |
| US | 147.185.221.19:16368 | being-nike.gl.at.ply.gg | tcp |
Files
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe
| MD5 | fff28d1ebc99a8ad6fcaf2d6012138e0 |
| SHA1 | 43c5e0fc035ece10ffac0b894f306c52fdda0827 |
| SHA256 | a4c55d3f1d659502076b1cedeb30acc151d649189d6af65b85d6dcb7577a0dd5 |
| SHA512 | d419ba2c59ee90d97ffb272c66bceba83d218d92a2e27927edf72b976b37d6b9caa040f056a7ee089c8d1662109a4598f84803b7b85fe8af0a98c5721c1cb40b |
memory/836-6-0x0000000000570000-0x0000000000584000-memory.dmp
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe
| MD5 | 671bd05179e820087dacf3cef052167b |
| SHA1 | 5423195011a9cce48322a50b2ef47ad629f2e325 |
| SHA256 | 4eee7dece6ae509c26acc045eaca510546b4ec4eaffcdf17c10f97f955367802 |
| SHA512 | 935d1d49cb67d72998f0d8532bfa68685074c67cf6f77957647a0e0dd45976c835cd1d5b0cf48c0d60ec9038899ce50de50cfb00c247e3b6facfc085da23fe91 |
memory/3156-11-0x00000000001C0000-0x00000000001D4000-memory.dmp
memory/4044-16-0x0000000000400000-0x000000000460B000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\Blum clicker new bild.exe
| MD5 | 656de415b0d19ce3fe199436eead8e72 |
| SHA1 | 128b9f50241f425b75749cf5cfbfa879604a3ea2 |
| SHA256 | ae24e891dd5d932aa55e901ba7fa4e1d826ef429e2d211d5f7ddc9fa7c325fdf |
| SHA512 | 024028e8b594d9ae47861b81051bacea3f4aee62a001b629f477abdec206d93a701514aad6105c8b8feccf90a8fc8334093221c680bfa986a4921a0c3b066b48 |
memory/1488-26-0x0000000000400000-0x00000000045AB000-memory.dmp
memory/3020-73-0x00000214DA530000-0x00000214DA552000-memory.dmp
C:\providerIntocommon\ZXmSvOcZ6hi4BoeMfr8lLzFjNRFijC4aZDJODcT3u.vbe
| MD5 | 4239ad2a31171e5c3b9ae650f8751a69 |
| SHA1 | d598e2abd0bb6e195c0be0bfe19887184dc9ea5d |
| SHA256 | 3cd82699526fd3869edc278144e0fdc957416dbde4294016049ba6e23b3c57c3 |
| SHA512 | 0ed6b842b723951d78114322639bd3b2636a9f0ce1e4a52f67254be6869587dc3955808800462d69548307b8d46416a9a4d3f3b0c7866b4ee57126518a92bf6f |
memory/3020-79-0x00000214DA6E0000-0x00000214DA756000-memory.dmp
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_quahvn10.mtj.ps1
| MD5 | c4ca4238a0b923820dcc509a6f75849b |
| SHA1 | 356a192b7913b04c54574d18c28d46e6395428ab |
| SHA256 | 6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b |
| SHA512 | 4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a |
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log
| MD5 | ad5cd538ca58cb28ede39c108acb5785 |
| SHA1 | 1ae910026f3dbe90ed025e9e96ead2b5399be877 |
| SHA256 | c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033 |
| SHA512 | c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | 5ed8b87c0c61322ab3dd02a04e0ed4d4 |
| SHA1 | 8aab86d6a2d5a7476c505e379a805fc4f27088bf |
| SHA256 | 7cd8e68ad9aea66b39e6cfdbe4fea5403dc04ee6b2fca7676d4bd36ad64a496c |
| SHA512 | 6f4716d92633dd3183b17f00851be82494206ebe2bbcfe6335cd062cb26687607b2722ede252da112a4eec3fc7534f7cdbcb3d53bbc366ff127a32fc05f9491b |
C:\Users\Admin\AppData\Local\Temp\_MEI4562\python312.dll
| MD5 | 550288a078dffc3430c08da888e70810 |
| SHA1 | 01b1d31f37fb3fd81d893cc5e4a258e976f5884f |
| SHA256 | 789a42ac160cef98f8925cb347473eeeb4e70f5513242e7faba5139ba06edf2d |
| SHA512 | 7244432fc3716f7ef27630d4e8fbc8180a2542aa97a01d44dca260ab43966dd8ac98b6023400b0478a4809aace1a128f1f4d6e544f2e591a5b436fd4c8a9d723 |
C:\Users\Admin\AppData\Local\Temp\_MEI4562\base_library.zip
| MD5 | 630153ac2b37b16b8c5b0dbb69a3b9d6 |
| SHA1 | f901cd701fe081489b45d18157b4a15c83943d9d |
| SHA256 | ec4e6b8e9f6f1f4b525af72d3a6827807c7a81978cb03db5767028ebea283be2 |
| SHA512 | 7e3a434c8df80d32e66036d831cbd6661641c0898bd0838a07038b460261bf25b72a626def06d0faa692caf64412ca699b1fa7a848fe9d969756e097cba39e41 |
\Users\Admin\AppData\Local\Temp\_MEI4562\VCRUNTIME140.dll
| MD5 | be8dbe2dc77ebe7f88f910c61aec691a |
| SHA1 | a19f08bb2b1c1de5bb61daf9f2304531321e0e40 |
| SHA256 | 4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83 |
| SHA512 | 0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655 |
C:\Users\Admin\AppData\Local\Temp\_MEI4562\_ctypes.pyd
| MD5 | 2a834c3738742d45c0a06d40221cc588 |
| SHA1 | 606705a593631d6767467fb38f9300d7cd04ab3e |
| SHA256 | f20dfa748b878751ea1c4fe77a230d65212720652b99c4e5577bce461bbd9089 |
| SHA512 | 924235a506ce4d635fa7c2b34e5d8e77eff73f963e58e29c6ef89db157bf7bab587678bb2120d09da70594926d82d87dbaa5d247e861e331cf591d45ea19a117 |
C:\Users\Admin\AppData\Local\Temp\_MEI4562\python3.DLL
| MD5 | 6271a2fe61978ca93e60588b6b63deb2 |
| SHA1 | be26455750789083865fe91e2b7a1ba1b457efb8 |
| SHA256 | a59487ea2c8723277f4579067248836b216a801c2152efb19afee4ac9785d6fb |
| SHA512 | 8c32bcb500a94ff47f5ef476ae65d3b677938ebee26e80350f28604aaee20b044a5d55442e94a11ccd9962f34d22610b932ac9d328197cf4d2ffbc7df640efba |
\Users\Admin\AppData\Local\Temp\_MEI4562\libffi-8.dll
| MD5 | 0f8e4992ca92baaf54cc0b43aaccce21 |
| SHA1 | c7300975df267b1d6adcbac0ac93fd7b1ab49bd2 |
| SHA256 | eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a |
| SHA512 | 6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978 |
C:\Users\Admin\AppData\Local\Temp\_MEI4562\_bz2.pyd
| MD5 | 59d60a559c23202beb622021af29e8a9 |
| SHA1 | a405f23916833f1b882f37bdbba2dd799f93ea32 |
| SHA256 | 706d4a0c26dd454538926cbb2ff6c64257c3d9bd48c956f7cabd6def36ffd13e |
| SHA512 | 2f60e79603cf456b2a14b8254cec75ce8be0a28d55a874d4fb23d92d63bbe781ed823ab0f4d13a23dc60c4df505cbf1dbe1a0a2049b02e4bdec8d374898002b1 |
\Users\Admin\AppData\Local\Temp\_MEI4562\_socket.pyd
| MD5 | 9c6283cc17f9d86106b706ec4ea77356 |
| SHA1 | af4f2f52ce6122f340e5ea1f021f98b1ffd6d5b6 |
| SHA256 | 5cc62aac52edf87916deb4ebbad9abb58a6a3565b32e7544f672aca305c38027 |
| SHA512 | 11fd6f570dd78f8ff00be645e47472a96daffa3253e8bd29183bccde3f0746f7e436a106e9a68c57cc05b80a112365441d06cc719d51c906703b428a32c93124 |
C:\Users\Admin\AppData\Local\Temp\_MEI4562\_wmi.pyd
| MD5 | c1654ebebfeeda425eade8b77ca96de5 |
| SHA1 | a4a150f1c810077b6e762f689c657227cc4fd257 |
| SHA256 | aa1443a715fbf84a84f39bd89707271fc11a77b597d7324ce86fc5cfa56a63a9 |
| SHA512 | 21705b991e75efd5e59b8431a3b19ae5fcc38a3e7f137a9d52acd24e7f67d61758e48abc1c9c0d4314fa02010a1886c15ead5bca8dca1b1d4ccbfc3c589d342e |
C:\Users\Admin\AppData\Local\Temp\_MEI4562\select.pyd
| MD5 | 8a273f518973801f3c63d92ad726ec03 |
| SHA1 | 069fc26b9bd0f6ea3f9b3821ad7c812fd94b021f |
| SHA256 | af358285a7450de6e2e5e7ff074f964d6a257fb41d9eb750146e03c7dda503ca |
| SHA512 | 7fedae0573ecb3946ede7d0b809a98acad3d4c95d6c531a40e51a31bdb035badc9f416d8aaa26463784ff2c5e7a0cc2c793d62b5fdb2b8e9fad357f93d3a65f8 |
\Users\Admin\AppData\Local\Temp\_MEI4562\pyexpat.pyd
| MD5 | f179c9bdd86a2a218a5bf9f0f1cf6cd9 |
| SHA1 | 4544fb23d56cc76338e7f71f12f58c5fe89d0d76 |
| SHA256 | c42874e2cf034fb5034f0be35f7592b8a96e8903218da42e6650c504a85b37cc |
| SHA512 | 3464ece5c6a0e95ef6136897b70a96c69e552d28bfedd266f13eec840e36ec2286a1fb8973b212317de6fe3e93d7d7cc782eb6fc3d6a2a8f006b34f6443498de |
\Users\Admin\AppData\Local\Temp\_MEI4562\_queue.pyd
| MD5 | f3eca4f0b2c6c17ace348e06042981a4 |
| SHA1 | eb694dda8ff2fe4ccae876dc0515a8efec40e20e |
| SHA256 | fb57ee6adf6e7b11451b6920ddd2fb943dcd9561c9eae64fdda27c7ed0bc1b04 |
| SHA512 | 604593460666045ca48f63d4b14fa250f9c4b9e5c7e228cc9202e7692c125aacb0018b89faa562a4197692a9bc3d2382f9e085b305272ee0a39264a2a0f53b75 |
C:\Users\Admin\AppData\Local\Temp\_MEI4562\_tkinter.pyd
| MD5 | a7929fd434e8803dde0951e6aa306d6a |
| SHA1 | b0cb108be0616678d68eb8328c065aa1fd38e563 |
| SHA256 | 5c400b4bc0367e1eff93955973efb3f85ce5970080bb1953f4e80bdf6f23c5c7 |
| SHA512 | b8a83fd831ae393ae7bc23d86af79d224142af41837002883296d62b3fdc059a3794f1bb2ecd7714ca75003bd07cb3fc0617d99ffa3867068bfb3a44bf5cf215 |
C:\Users\Admin\AppData\Local\Temp\_MEI4562\_ssl.pyd
| MD5 | ddb21bd1acde4264754c49842de7ebc9 |
| SHA1 | 80252d0e35568e68ded68242d76f2a5d7e00001e |
| SHA256 | 72bb15cd8c14ba008a52d23cdcfc851a9a4bde13deee302a5667c8ad60f94a57 |
| SHA512 | 464520ecd1587f5cede6219faac2c903ee41d0e920bf3c9c270a544b040169dcd17a4e27f6826f480d4021077ab39a6cbbd35ebb3d71672ebb412023bc9e182a |
\Users\Admin\AppData\Local\Temp\_MEI4562\tcl86t.dll
| MD5 | b0261de5ef4879a442abdcd03dedfa3c |
| SHA1 | 7f13684ff91fcd60b4712f6cf9e46eb08e57c145 |
| SHA256 | 28b61545d3a53460f41c20dacf0e0df2ba687a5c85f9ed5c34dbfc7ed2f23e3e |
| SHA512 | e39a242e321e92761256b2b4bdde7f9d880b5c64d4778b87fa98bf4ac93a0248e408a332ae214b7ffd76fb9d219555dc10ab8327806d8d63309bf6d147ebbd59 |
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
| MD5 | 7828f8c6919fa9b513c41d29d3979a8c |
| SHA1 | ac5ce4b34372b9d846364035829df169344b5531 |
| SHA256 | f09fbee27ec046f5ebadcf5bce2ddb9d8ab74c018048f350c896c2f5a8c7add0 |
| SHA512 | 49a993ef59ca5e712a952015c1921c6df9f0f8624e2baf0228b89e40192034cb04654af936a7a518dd094bcb379a20a4afbbd387087caef9335ad7c529902dfb |
C:\Users\Admin\AppData\Local\Temp\_MEI4562\tcl\encoding\cp1252.enc
| MD5 | e9117326c06fee02c478027cb625c7d8 |
| SHA1 | 2ed4092d573289925a5b71625cf43cc82b901daf |
| SHA256 | 741859cf238c3a63bbb20ec6ed51e46451372bb221cfff438297d261d0561c2e |
| SHA512 | d0a39bc41adc32f2f20b1a0ebad33bf48dfa6ed5cc1d8f92700cdd431db6c794c09d9f08bb5709b394acf54116c3a1e060e2abcc6b503e1501f8364d3eebcd52 |
C:\Users\Admin\AppData\Local\Temp\_MEI4562\cv2\__init__.py
| MD5 | eab99b31f1fd18e46e6e081ba3b5c06e |
| SHA1 | 9ca76b1097d58ef9c652aebfbeff32bfec17b25b |
| SHA256 | b05b8000c71987cd4df824c1ed134b7fcd34617665e437b1aaec128f93d7f1c3 |
| SHA512 | 7c4ea4a28f7876249b503155187bd59bcd9cf18a80264c8892e59e9fd7f3d461c91afc4c3c177dba48e1dfdd0feb5705b54b504f7daa886a2a0b72fddd1e80fc |
\Users\Admin\AppData\Local\Temp\_MEI4562\PIL\_imaging.cp312-win_amd64.pyd
| MD5 | 0376776f076cd4f4ac15ec4d813c5470 |
| SHA1 | 381f84735a11ace4673d8be53138e652d4415413 |
| SHA256 | a7ddf4d7cab08676bb88a42059353c5374600901b3ab880e17ee1a0d0150c380 |
| SHA512 | 06d68b9e5daf90d05855bf2c57b6110bfc2f20f4731b023b5aaa39145fd3ab66525d39988b8516731045ad16a89eb0457487dd080aeb347ba24a2e47ece98bbd |
\Users\Admin\AppData\Local\Temp\_MEI4562\zlib1.dll
| MD5 | b4a0b3d5abc631e95c074eee44e73f96 |
| SHA1 | c22c8baa23d731a0e08757d0449ca3dd662fd9e6 |
| SHA256 | c89c8a2fcf11d8191c7690027055431906aae827fc7f443f0908ad062e7e653e |
| SHA512 | 56bafd1c6c77343f724a8430a1f496b4a3160faa9a19ea40796438ae67d6c45f8a13224dcf3d1defb97140a2e47a248dd837801a8cb4674e7890b495aeec538e |
\Users\Admin\AppData\Local\Temp\_MEI4562\tk86t.dll
| MD5 | ef0d7469a88afb64944e2b2d91eb3e7f |
| SHA1 | a26fd3de8da3e4aec417cebfa2de78f9ba7cf05b |
| SHA256 | 23a195e1e3922215148e1e09a249b4fe017a73b3564af90b0f6fd4d9e5dda4da |
| SHA512 | 909f0b73b64bad84b896a973b58735747d87b5133207cb3d9fa9ce0c026ee59255b7660c43bb86b1ddeef9fbb80b2250719fd379cff7afd9dbec6f6a007ed093 |
C:\Users\Admin\AppData\Local\Temp\_MEI4562\_overlapped.pyd
| MD5 | 61193e813a61a545e2d366439c1ee22a |
| SHA1 | f404447b0d9bff49a7431c41653633c501986d60 |
| SHA256 | c21b50a7bf9dbe1a0768f5030cac378d58705a9fe1f08d953129332beb0fbefc |
| SHA512 | 747e4d5ea1bdf8c1e808579498834e1c24641d434546bffdfcf326e0de8d5814504623a3d3729168b0098824c2b8929afc339674b0d923388b9dac66f5d9d996 |
C:\Users\Admin\AppData\Local\Temp\_MEI4562\_multiprocessing.pyd
| MD5 | 4ccbd87d76af221f24221530f5f035d1 |
| SHA1 | d02b989aaac7657e8b3a70a6ee7758a0b258851b |
| SHA256 | c7bbcfe2511fd1b71b916a22ad6537d60948ffa7bde207fefabee84ef53cafb5 |
| SHA512 | 34d808adac96a66ca434d209f2f151a9640b359b8419dc51ba24477e485685af10c4596a398a85269e8f03f0fc533645907d7d854733750a35bf6c691de37799 |
C:\Users\Admin\AppData\Local\Temp\_MEI4562\_hashlib.pyd
| MD5 | b0262bd89a59a3699bfa75c4dcc3ee06 |
| SHA1 | eb658849c646a26572dea7f6bfc042cb62fb49dc |
| SHA256 | 4adfbbd6366d9b55d902fc54d2b42e7c8c989a83016ed707bd7a302fc3fc7b67 |
| SHA512 | 2e4b214de3b306e3a16124af434ff8f5ab832aa3eeb1aa0aa9b49b0ada0928dcbb05c57909292fbe3b01126f4cd3fe0dac9cc15eaea5f3844d6e267865b9f7b1 |
C:\Users\Admin\AppData\Local\Temp\_MEI4562\_decimal.pyd
| MD5 | f930b7550574446a015bc602d59b0948 |
| SHA1 | 4ee6ff8019c6c540525bdd2790fc76385cdd6186 |
| SHA256 | 3b9ad1d2bc9ec03d37da86135853dac73b3fe851b164fe52265564a81eb8c544 |
| SHA512 | 10b864975945d6504433554f9ff11b47218caa00f809c6bce00f9e4089b862190a4219f659697a4ba5e5c21edbe1d8d325950921e09371acc4410469bd9189ee |
C:\Users\Admin\AppData\Local\Temp\_MEI4562\_asyncio.pyd
| MD5 | 209cbcb4e1a16aa39466a6119322343c |
| SHA1 | cdcce6b64ebf11fecff739cbc57e7a98d6620801 |
| SHA256 | f7069734d5174f54e89b88d717133bff6a41b01e57f79957ab3f02daa583f9e2 |
| SHA512 | 5bbc4ede01729e628260cf39df5809624eae795fd7d51a1ed770ed54663955674593a97b78f66dbf6ae268186273840806ed06d6f7877444d32fdca031a9f0da |
C:\Users\Admin\AppData\Local\Temp\_MEI4562\VCRUNTIME140_1.dll
| MD5 | f8dfa78045620cf8a732e67d1b1eb53d |
| SHA1 | ff9a604d8c99405bfdbbf4295825d3fcbc792704 |
| SHA256 | a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5 |
| SHA512 | ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371 |
C:\Users\Admin\AppData\Local\Temp\_MEI4562\unicodedata.pyd
| MD5 | 04f35d7eec1f6b72bab9daf330fd0d6b |
| SHA1 | ecf0c25ba7adf7624109e2720f2b5930cd2dba65 |
| SHA256 | be942308d99cc954931fe6f48ed8cc7a57891ccbe99aae728121bcda1fd929ab |
| SHA512 | 3da405e4c1371f4b265e744229dcc149491a112a2b7ea8e518d5945f8c259cad15583f25592b35ec8a344e43007ae00da9673822635ee734d32664f65c9c8d9b |
C:\Users\Admin\AppData\Local\Temp\_MEI4562\libssl-3.dll
| MD5 | 19a2aba25456181d5fb572d88ac0e73e |
| SHA1 | 656ca8cdfc9c3a6379536e2027e93408851483db |
| SHA256 | 2e9fbcd8f7fdc13a5179533239811456554f2b3aa2fb10e1b17be0df81c79006 |
| SHA512 | df17dc8a882363a6c5a1b78ba3cf448437d1118ccc4a6275cc7681551b13c1a4e0f94e30ffb94c3530b688b62bff1c03e57c2c185a7df2bf3e5737a06e114337 |
C:\Users\Admin\AppData\Local\Temp\_MEI4562\libcrypto-3.dll
| MD5 | e547cf6d296a88f5b1c352c116df7c0c |
| SHA1 | cafa14e0367f7c13ad140fd556f10f320a039783 |
| SHA256 | 05fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de |
| SHA512 | 9f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d |
\Users\Admin\AppData\Local\Temp\_MEI4562\_lzma.pyd
| MD5 | b71dbe0f137ffbda6c3a89d5bcbf1017 |
| SHA1 | a2e2bdc40fdb83cc625c5b5e8a336ca3f0c29c5f |
| SHA256 | 6216173194b29875e84963cd4dc4752f7ca9493f5b1fd7e4130ca0e411c8ac6a |
| SHA512 | 9a5c7b1e25d8e1b5738f01aedfd468c1837f1ac8dd4a5b1d24ce86dcae0db1c5b20f2ff4280960bc523aee70b71db54fd515047cdaf10d21a8bec3ebd6663358 |
memory/384-1430-0x0000000000130000-0x0000000000318000-memory.dmp
memory/384-1438-0x0000000000B60000-0x0000000000B7C000-memory.dmp
memory/384-1439-0x000000001AE70000-0x000000001AEC0000-memory.dmp
memory/384-1441-0x0000000002540000-0x0000000002558000-memory.dmp
memory/384-1443-0x0000000000B10000-0x0000000000B1E000-memory.dmp
memory/384-1445-0x0000000002560000-0x000000000256E000-memory.dmp
memory/384-1447-0x0000000002570000-0x000000000257C000-memory.dmp
memory/5016-1448-0x00007FFC6ABA0000-0x00007FFC6ABCA000-memory.dmp
memory/5016-1449-0x00007FFC520B0000-0x00007FFC54166000-memory.dmp
memory/384-1450-0x000000001C0C0000-0x000000001C226000-memory.dmp
memory/384-1504-0x000000001C0C0000-0x000000001C226000-memory.dmp