Malware Analysis Report

2024-09-11 14:49

Sample ID 240610-n6wp2saf48
Target Blum.exe
SHA256 528cd3a29332df4d79202214ce24768eab6f2535c81b586ddba6e0708332b9d8
Tags
pyinstaller xworm execution persistence rat spyware stealer trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

528cd3a29332df4d79202214ce24768eab6f2535c81b586ddba6e0708332b9d8

Threat Level: Known bad

The file Blum.exe was found to be: Known bad.

Malicious Activity Summary

pyinstaller xworm execution persistence rat spyware stealer trojan

Xworm

Detect Xworm Payload

Command and Scripting Interpreter: PowerShell

Reads user/profile data of web browsers

Executes dropped EXE

Drops startup file

Loads dropped DLL

Looks up external IP address via web service

Adds Run key to start application

Detects Pyinstaller

Enumerates physical storage devices

Unsigned PE

Uses Task Scheduler COM API

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

Modifies registry class

Suspicious use of AdjustPrivilegeToken

Creates scheduled task(s)

Suspicious use of WriteProcessMemory

Suspicious behavior: AddClipboardFormatListener

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-10 12:01

Signatures

Detects Pyinstaller

pyinstaller
Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-10 12:01

Reported

2024-06-10 12:04

Platform

win10-20240404-en

Max time kernel

147s

Max time network

158s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Blum.exe"

Signatures

Detect Xworm Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Xworm

trojan rat xworm

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe C:\Users\Admin\AppData\Local\Temp\Blum.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe C:\Users\Admin\AppData\Local\Temp\Blum.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecurityHealthSystray.lnk C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SecurityHealthSystray.lnk C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.lnk C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.lnk C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe N/A

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000\Software\Microsoft\Windows\CurrentVersion\Run\Telegram = "C:\\Users\\Admin\\AppData\\Roaming\\Telegram.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000\Software\Microsoft\Windows\CurrentVersion\Run\SecurityHealthSystray = "C:\\Users\\Admin\\AppData\\Roaming\\SecurityHealthSystray.exe" C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe N/A

Looks up external IP address via web service

Description Indicator Process Target
N/A ip-api.com N/A N/A

Enumerates physical storage devices

Creates scheduled task(s)

persistence
Description Indicator Process Target
N/A N/A C:\Windows\System32\schtasks.exe N/A
N/A N/A C:\Windows\System32\schtasks.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\Blum clicker new bild.exe N/A
Key created \REGISTRY\USER\S-1-5-21-1739856679-3467441365-73334005-1000_Classes\Local Settings C:\providerIntocommon\comReviewIntodll.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe N/A
N/A N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A
N/A N/A C:\providerIntocommon\comReviewIntodll.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 33 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 34 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 35 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 36 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 33 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 34 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 35 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: 36 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4044 wrote to memory of 836 N/A C:\Users\Admin\AppData\Local\Temp\Blum.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe
PID 4044 wrote to memory of 836 N/A C:\Users\Admin\AppData\Local\Temp\Blum.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe
PID 4044 wrote to memory of 3156 N/A C:\Users\Admin\AppData\Local\Temp\Blum.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe
PID 4044 wrote to memory of 3156 N/A C:\Users\Admin\AppData\Local\Temp\Blum.exe C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe
PID 4044 wrote to memory of 1488 N/A C:\Users\Admin\AppData\Local\Temp\Blum.exe C:\Users\Admin\AppData\Local\Temp\Blum clicker.exe
PID 4044 wrote to memory of 1488 N/A C:\Users\Admin\AppData\Local\Temp\Blum.exe C:\Users\Admin\AppData\Local\Temp\Blum clicker.exe
PID 4044 wrote to memory of 1488 N/A C:\Users\Admin\AppData\Local\Temp\Blum.exe C:\Users\Admin\AppData\Local\Temp\Blum clicker.exe
PID 1488 wrote to memory of 456 N/A C:\Users\Admin\AppData\Local\Temp\Blum clicker.exe C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe
PID 1488 wrote to memory of 456 N/A C:\Users\Admin\AppData\Local\Temp\Blum clicker.exe C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe
PID 1488 wrote to memory of 2840 N/A C:\Users\Admin\AppData\Local\Temp\Blum clicker.exe C:\Users\Admin\AppData\Local\Temp\Blum clicker new bild.exe
PID 1488 wrote to memory of 2840 N/A C:\Users\Admin\AppData\Local\Temp\Blum clicker.exe C:\Users\Admin\AppData\Local\Temp\Blum clicker new bild.exe
PID 1488 wrote to memory of 2840 N/A C:\Users\Admin\AppData\Local\Temp\Blum clicker.exe C:\Users\Admin\AppData\Local\Temp\Blum clicker new bild.exe
PID 3156 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3156 wrote to memory of 3020 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 836 wrote to memory of 2084 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 836 wrote to memory of 2084 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2840 wrote to memory of 3420 N/A C:\Users\Admin\AppData\Local\Temp\Blum clicker new bild.exe C:\Windows\SysWOW64\WScript.exe
PID 2840 wrote to memory of 3420 N/A C:\Users\Admin\AppData\Local\Temp\Blum clicker new bild.exe C:\Windows\SysWOW64\WScript.exe
PID 2840 wrote to memory of 3420 N/A C:\Users\Admin\AppData\Local\Temp\Blum clicker new bild.exe C:\Windows\SysWOW64\WScript.exe
PID 836 wrote to memory of 4412 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 836 wrote to memory of 4412 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3156 wrote to memory of 5092 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3156 wrote to memory of 5092 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 456 wrote to memory of 5016 N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe
PID 456 wrote to memory of 5016 N/A C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe
PID 3156 wrote to memory of 2352 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3156 wrote to memory of 2352 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 836 wrote to memory of 4380 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 836 wrote to memory of 4380 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3156 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3156 wrote to memory of 1736 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 836 wrote to memory of 684 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 836 wrote to memory of 684 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3156 wrote to memory of 200 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe C:\Windows\System32\schtasks.exe
PID 3156 wrote to memory of 200 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe C:\Windows\System32\schtasks.exe
PID 3420 wrote to memory of 1408 N/A C:\Windows\SysWOW64\WScript.exe C:\Windows\SysWOW64\cmd.exe
PID 3420 wrote to memory of 1408 N/A C:\Windows\SysWOW64\WScript.exe C:\Windows\SysWOW64\cmd.exe
PID 3420 wrote to memory of 1408 N/A C:\Windows\SysWOW64\WScript.exe C:\Windows\SysWOW64\cmd.exe
PID 1408 wrote to memory of 384 N/A C:\Windows\SysWOW64\cmd.exe C:\providerIntocommon\comReviewIntodll.exe
PID 1408 wrote to memory of 384 N/A C:\Windows\SysWOW64\cmd.exe C:\providerIntocommon\comReviewIntodll.exe
PID 836 wrote to memory of 936 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe C:\Windows\System32\schtasks.exe
PID 836 wrote to memory of 936 N/A C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe C:\Windows\System32\schtasks.exe
PID 384 wrote to memory of 2060 N/A C:\providerIntocommon\comReviewIntodll.exe C:\Windows\System32\cmd.exe
PID 384 wrote to memory of 2060 N/A C:\providerIntocommon\comReviewIntodll.exe C:\Windows\System32\cmd.exe
PID 2060 wrote to memory of 2404 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\chcp.com
PID 2060 wrote to memory of 2404 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\chcp.com
PID 2060 wrote to memory of 536 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe
PID 2060 wrote to memory of 536 N/A C:\Windows\System32\cmd.exe C:\Windows\system32\w32tm.exe

Uses Task Scheduler COM API

persistence

Processes

C:\Users\Admin\AppData\Local\Temp\Blum.exe

"C:\Users\Admin\AppData\Local\Temp\Blum.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe"

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe

"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe"

C:\Users\Admin\AppData\Local\Temp\Blum clicker.exe

"C:\Users\Admin\AppData\Local\Temp\Blum clicker.exe"

C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe

"C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe"

C:\Users\Admin\AppData\Local\Temp\Blum clicker new bild.exe

"C:\Users\Admin\AppData\Local\Temp\Blum clicker new bild.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe'

C:\Windows\SysWOW64\WScript.exe

"C:\Windows\System32\WScript.exe" "C:\providerIntocommon\ZXmSvOcZ6hi4BoeMfr8lLzFjNRFijC4aZDJODcT3u.vbe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Telegram.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe'

C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe

"C:\Users\Admin\AppData\Local\Temp\blum_complete_edition.exe"

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\Telegram.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'SecurityHealthSystray.exe'

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Telegram.exe'

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "SecurityHealthSystray" /tr "C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe"

C:\Windows\SysWOW64\cmd.exe

C:\Windows\system32\cmd.exe /c ""C:\providerIntocommon\AL7pCLVlantRsaAqsU.bat" "

C:\providerIntocommon\comReviewIntodll.exe

"C:\providerIntocommon/comReviewIntodll.exe"

C:\Windows\System32\schtasks.exe

"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Telegram" /tr "C:\Users\Admin\AppData\Roaming\Telegram.exe"

C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe

C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe

C:\Users\Admin\AppData\Roaming\Telegram.exe

C:\Users\Admin\AppData\Roaming\Telegram.exe

C:\Users\Admin\AppData\Roaming\Telegram.exe

C:\Users\Admin\AppData\Roaming\Telegram.exe

C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe

C:\Users\Admin\AppData\Roaming\SecurityHealthSystray.exe

C:\Windows\System32\cmd.exe

"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\WPmuDeaX4D.bat"

C:\Windows\system32\chcp.com

chcp 65001

C:\Windows\system32\w32tm.exe

w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2

Network

Country Destination Domain Proto
US 8.8.8.8:53 ip-api.com udp
US 208.95.112.1:80 ip-api.com tcp
US 208.95.112.1:80 ip-api.com tcp
US 8.8.8.8:53 1.112.95.208.in-addr.arpa udp
US 8.8.8.8:53 api.telegram.org udp
NL 149.154.167.220:443 api.telegram.org tcp
US 8.8.8.8:53 220.167.154.149.in-addr.arpa udp
US 8.8.8.8:53 api.telegram.org udp
NL 149.154.167.220:443 api.telegram.org tcp
GB 38.180.165.153:80 38.180.165.153 tcp
GB 38.180.165.153:80 38.180.165.153 tcp
US 8.8.8.8:53 being-nike.gl.at.ply.gg udp
US 147.185.221.19:16368 being-nike.gl.at.ply.gg tcp
US 147.185.221.19:16368 being-nike.gl.at.ply.gg tcp
US 8.8.8.8:53 153.165.180.38.in-addr.arpa udp
US 147.185.221.19:16368 being-nike.gl.at.ply.gg tcp
US 147.185.221.19:16368 being-nike.gl.at.ply.gg tcp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 147.185.221.19:16368 being-nike.gl.at.ply.gg tcp
US 147.185.221.19:16368 being-nike.gl.at.ply.gg tcp
US 147.185.221.19:16368 being-nike.gl.at.ply.gg tcp
US 147.185.221.19:16368 being-nike.gl.at.ply.gg tcp
US 147.185.221.19:16368 being-nike.gl.at.ply.gg tcp
US 147.185.221.19:16368 being-nike.gl.at.ply.gg tcp

Files

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Telegram.exe

MD5 fff28d1ebc99a8ad6fcaf2d6012138e0
SHA1 43c5e0fc035ece10ffac0b894f306c52fdda0827
SHA256 a4c55d3f1d659502076b1cedeb30acc151d649189d6af65b85d6dcb7577a0dd5
SHA512 d419ba2c59ee90d97ffb272c66bceba83d218d92a2e27927edf72b976b37d6b9caa040f056a7ee089c8d1662109a4598f84803b7b85fe8af0a98c5721c1cb40b

memory/836-6-0x0000000000570000-0x0000000000584000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\bc1qr3ng0yctkhyf0ud3culx8mgcwy2g8fqmyky08u.exe

MD5 671bd05179e820087dacf3cef052167b
SHA1 5423195011a9cce48322a50b2ef47ad629f2e325
SHA256 4eee7dece6ae509c26acc045eaca510546b4ec4eaffcdf17c10f97f955367802
SHA512 935d1d49cb67d72998f0d8532bfa68685074c67cf6f77957647a0e0dd45976c835cd1d5b0cf48c0d60ec9038899ce50de50cfb00c247e3b6facfc085da23fe91

memory/3156-11-0x00000000001C0000-0x00000000001D4000-memory.dmp

memory/4044-16-0x0000000000400000-0x000000000460B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\Blum clicker new bild.exe

MD5 656de415b0d19ce3fe199436eead8e72
SHA1 128b9f50241f425b75749cf5cfbfa879604a3ea2
SHA256 ae24e891dd5d932aa55e901ba7fa4e1d826ef429e2d211d5f7ddc9fa7c325fdf
SHA512 024028e8b594d9ae47861b81051bacea3f4aee62a001b629f477abdec206d93a701514aad6105c8b8feccf90a8fc8334093221c680bfa986a4921a0c3b066b48

memory/1488-26-0x0000000000400000-0x00000000045AB000-memory.dmp

memory/3020-73-0x00000214DA530000-0x00000214DA552000-memory.dmp

C:\providerIntocommon\ZXmSvOcZ6hi4BoeMfr8lLzFjNRFijC4aZDJODcT3u.vbe

MD5 4239ad2a31171e5c3b9ae650f8751a69
SHA1 d598e2abd0bb6e195c0be0bfe19887184dc9ea5d
SHA256 3cd82699526fd3869edc278144e0fdc957416dbde4294016049ba6e23b3c57c3
SHA512 0ed6b842b723951d78114322639bd3b2636a9f0ce1e4a52f67254be6869587dc3955808800462d69548307b8d46416a9a4d3f3b0c7866b4ee57126518a92bf6f

memory/3020-79-0x00000214DA6E0000-0x00000214DA756000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_quahvn10.mtj.ps1

MD5 c4ca4238a0b923820dcc509a6f75849b
SHA1 356a192b7913b04c54574d18c28d46e6395428ab
SHA256 6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA512 4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

MD5 ad5cd538ca58cb28ede39c108acb5785
SHA1 1ae910026f3dbe90ed025e9e96ead2b5399be877
SHA256 c9e6cb04d6c893458d5a7e12eb575cf97c3172f5e312b1f63a667cbbc5f0c033
SHA512 c066c5d9b276a68fa636647bb29aea05bfa2292217bc77f5324d9c1d93117772ee8277e1f7cff91ec8d6b7c05ca078f929cecfdbb09582522a9067f54740af13

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 5ed8b87c0c61322ab3dd02a04e0ed4d4
SHA1 8aab86d6a2d5a7476c505e379a805fc4f27088bf
SHA256 7cd8e68ad9aea66b39e6cfdbe4fea5403dc04ee6b2fca7676d4bd36ad64a496c
SHA512 6f4716d92633dd3183b17f00851be82494206ebe2bbcfe6335cd062cb26687607b2722ede252da112a4eec3fc7534f7cdbcb3d53bbc366ff127a32fc05f9491b

C:\Users\Admin\AppData\Local\Temp\_MEI4562\python312.dll

MD5 550288a078dffc3430c08da888e70810
SHA1 01b1d31f37fb3fd81d893cc5e4a258e976f5884f
SHA256 789a42ac160cef98f8925cb347473eeeb4e70f5513242e7faba5139ba06edf2d
SHA512 7244432fc3716f7ef27630d4e8fbc8180a2542aa97a01d44dca260ab43966dd8ac98b6023400b0478a4809aace1a128f1f4d6e544f2e591a5b436fd4c8a9d723

C:\Users\Admin\AppData\Local\Temp\_MEI4562\base_library.zip

MD5 630153ac2b37b16b8c5b0dbb69a3b9d6
SHA1 f901cd701fe081489b45d18157b4a15c83943d9d
SHA256 ec4e6b8e9f6f1f4b525af72d3a6827807c7a81978cb03db5767028ebea283be2
SHA512 7e3a434c8df80d32e66036d831cbd6661641c0898bd0838a07038b460261bf25b72a626def06d0faa692caf64412ca699b1fa7a848fe9d969756e097cba39e41

\Users\Admin\AppData\Local\Temp\_MEI4562\VCRUNTIME140.dll

MD5 be8dbe2dc77ebe7f88f910c61aec691a
SHA1 a19f08bb2b1c1de5bb61daf9f2304531321e0e40
SHA256 4d292623516f65c80482081e62d5dadb759dc16e851de5db24c3cbb57b87db83
SHA512 0da644472b374f1da449a06623983d0477405b5229e386accadb154b43b8b083ee89f07c3f04d2c0c7501ead99ad95aecaa5873ff34c5eeb833285b598d5a655

C:\Users\Admin\AppData\Local\Temp\_MEI4562\_ctypes.pyd

MD5 2a834c3738742d45c0a06d40221cc588
SHA1 606705a593631d6767467fb38f9300d7cd04ab3e
SHA256 f20dfa748b878751ea1c4fe77a230d65212720652b99c4e5577bce461bbd9089
SHA512 924235a506ce4d635fa7c2b34e5d8e77eff73f963e58e29c6ef89db157bf7bab587678bb2120d09da70594926d82d87dbaa5d247e861e331cf591d45ea19a117

C:\Users\Admin\AppData\Local\Temp\_MEI4562\python3.DLL

MD5 6271a2fe61978ca93e60588b6b63deb2
SHA1 be26455750789083865fe91e2b7a1ba1b457efb8
SHA256 a59487ea2c8723277f4579067248836b216a801c2152efb19afee4ac9785d6fb
SHA512 8c32bcb500a94ff47f5ef476ae65d3b677938ebee26e80350f28604aaee20b044a5d55442e94a11ccd9962f34d22610b932ac9d328197cf4d2ffbc7df640efba

\Users\Admin\AppData\Local\Temp\_MEI4562\libffi-8.dll

MD5 0f8e4992ca92baaf54cc0b43aaccce21
SHA1 c7300975df267b1d6adcbac0ac93fd7b1ab49bd2
SHA256 eff52743773eb550fcc6ce3efc37c85724502233b6b002a35496d828bd7b280a
SHA512 6e1b223462dc124279bfca74fd2c66fe18b368ffbca540c84e82e0f5bcbea0e10cc243975574fa95ace437b9d8b03a446ed5ee0c9b1b094147cefaf704dfe978

C:\Users\Admin\AppData\Local\Temp\_MEI4562\_bz2.pyd

MD5 59d60a559c23202beb622021af29e8a9
SHA1 a405f23916833f1b882f37bdbba2dd799f93ea32
SHA256 706d4a0c26dd454538926cbb2ff6c64257c3d9bd48c956f7cabd6def36ffd13e
SHA512 2f60e79603cf456b2a14b8254cec75ce8be0a28d55a874d4fb23d92d63bbe781ed823ab0f4d13a23dc60c4df505cbf1dbe1a0a2049b02e4bdec8d374898002b1

\Users\Admin\AppData\Local\Temp\_MEI4562\_socket.pyd

MD5 9c6283cc17f9d86106b706ec4ea77356
SHA1 af4f2f52ce6122f340e5ea1f021f98b1ffd6d5b6
SHA256 5cc62aac52edf87916deb4ebbad9abb58a6a3565b32e7544f672aca305c38027
SHA512 11fd6f570dd78f8ff00be645e47472a96daffa3253e8bd29183bccde3f0746f7e436a106e9a68c57cc05b80a112365441d06cc719d51c906703b428a32c93124

C:\Users\Admin\AppData\Local\Temp\_MEI4562\_wmi.pyd

MD5 c1654ebebfeeda425eade8b77ca96de5
SHA1 a4a150f1c810077b6e762f689c657227cc4fd257
SHA256 aa1443a715fbf84a84f39bd89707271fc11a77b597d7324ce86fc5cfa56a63a9
SHA512 21705b991e75efd5e59b8431a3b19ae5fcc38a3e7f137a9d52acd24e7f67d61758e48abc1c9c0d4314fa02010a1886c15ead5bca8dca1b1d4ccbfc3c589d342e

C:\Users\Admin\AppData\Local\Temp\_MEI4562\select.pyd

MD5 8a273f518973801f3c63d92ad726ec03
SHA1 069fc26b9bd0f6ea3f9b3821ad7c812fd94b021f
SHA256 af358285a7450de6e2e5e7ff074f964d6a257fb41d9eb750146e03c7dda503ca
SHA512 7fedae0573ecb3946ede7d0b809a98acad3d4c95d6c531a40e51a31bdb035badc9f416d8aaa26463784ff2c5e7a0cc2c793d62b5fdb2b8e9fad357f93d3a65f8

\Users\Admin\AppData\Local\Temp\_MEI4562\pyexpat.pyd

MD5 f179c9bdd86a2a218a5bf9f0f1cf6cd9
SHA1 4544fb23d56cc76338e7f71f12f58c5fe89d0d76
SHA256 c42874e2cf034fb5034f0be35f7592b8a96e8903218da42e6650c504a85b37cc
SHA512 3464ece5c6a0e95ef6136897b70a96c69e552d28bfedd266f13eec840e36ec2286a1fb8973b212317de6fe3e93d7d7cc782eb6fc3d6a2a8f006b34f6443498de

\Users\Admin\AppData\Local\Temp\_MEI4562\_queue.pyd

MD5 f3eca4f0b2c6c17ace348e06042981a4
SHA1 eb694dda8ff2fe4ccae876dc0515a8efec40e20e
SHA256 fb57ee6adf6e7b11451b6920ddd2fb943dcd9561c9eae64fdda27c7ed0bc1b04
SHA512 604593460666045ca48f63d4b14fa250f9c4b9e5c7e228cc9202e7692c125aacb0018b89faa562a4197692a9bc3d2382f9e085b305272ee0a39264a2a0f53b75

C:\Users\Admin\AppData\Local\Temp\_MEI4562\_tkinter.pyd

MD5 a7929fd434e8803dde0951e6aa306d6a
SHA1 b0cb108be0616678d68eb8328c065aa1fd38e563
SHA256 5c400b4bc0367e1eff93955973efb3f85ce5970080bb1953f4e80bdf6f23c5c7
SHA512 b8a83fd831ae393ae7bc23d86af79d224142af41837002883296d62b3fdc059a3794f1bb2ecd7714ca75003bd07cb3fc0617d99ffa3867068bfb3a44bf5cf215

C:\Users\Admin\AppData\Local\Temp\_MEI4562\_ssl.pyd

MD5 ddb21bd1acde4264754c49842de7ebc9
SHA1 80252d0e35568e68ded68242d76f2a5d7e00001e
SHA256 72bb15cd8c14ba008a52d23cdcfc851a9a4bde13deee302a5667c8ad60f94a57
SHA512 464520ecd1587f5cede6219faac2c903ee41d0e920bf3c9c270a544b040169dcd17a4e27f6826f480d4021077ab39a6cbbd35ebb3d71672ebb412023bc9e182a

\Users\Admin\AppData\Local\Temp\_MEI4562\tcl86t.dll

MD5 b0261de5ef4879a442abdcd03dedfa3c
SHA1 7f13684ff91fcd60b4712f6cf9e46eb08e57c145
SHA256 28b61545d3a53460f41c20dacf0e0df2ba687a5c85f9ed5c34dbfc7ed2f23e3e
SHA512 e39a242e321e92761256b2b4bdde7f9d880b5c64d4778b87fa98bf4ac93a0248e408a332ae214b7ffd76fb9d219555dc10ab8327806d8d63309bf6d147ebbd59

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 7828f8c6919fa9b513c41d29d3979a8c
SHA1 ac5ce4b34372b9d846364035829df169344b5531
SHA256 f09fbee27ec046f5ebadcf5bce2ddb9d8ab74c018048f350c896c2f5a8c7add0
SHA512 49a993ef59ca5e712a952015c1921c6df9f0f8624e2baf0228b89e40192034cb04654af936a7a518dd094bcb379a20a4afbbd387087caef9335ad7c529902dfb

C:\Users\Admin\AppData\Local\Temp\_MEI4562\tcl\encoding\cp1252.enc

MD5 e9117326c06fee02c478027cb625c7d8
SHA1 2ed4092d573289925a5b71625cf43cc82b901daf
SHA256 741859cf238c3a63bbb20ec6ed51e46451372bb221cfff438297d261d0561c2e
SHA512 d0a39bc41adc32f2f20b1a0ebad33bf48dfa6ed5cc1d8f92700cdd431db6c794c09d9f08bb5709b394acf54116c3a1e060e2abcc6b503e1501f8364d3eebcd52

C:\Users\Admin\AppData\Local\Temp\_MEI4562\cv2\__init__.py

MD5 eab99b31f1fd18e46e6e081ba3b5c06e
SHA1 9ca76b1097d58ef9c652aebfbeff32bfec17b25b
SHA256 b05b8000c71987cd4df824c1ed134b7fcd34617665e437b1aaec128f93d7f1c3
SHA512 7c4ea4a28f7876249b503155187bd59bcd9cf18a80264c8892e59e9fd7f3d461c91afc4c3c177dba48e1dfdd0feb5705b54b504f7daa886a2a0b72fddd1e80fc

\Users\Admin\AppData\Local\Temp\_MEI4562\PIL\_imaging.cp312-win_amd64.pyd

MD5 0376776f076cd4f4ac15ec4d813c5470
SHA1 381f84735a11ace4673d8be53138e652d4415413
SHA256 a7ddf4d7cab08676bb88a42059353c5374600901b3ab880e17ee1a0d0150c380
SHA512 06d68b9e5daf90d05855bf2c57b6110bfc2f20f4731b023b5aaa39145fd3ab66525d39988b8516731045ad16a89eb0457487dd080aeb347ba24a2e47ece98bbd

\Users\Admin\AppData\Local\Temp\_MEI4562\zlib1.dll

MD5 b4a0b3d5abc631e95c074eee44e73f96
SHA1 c22c8baa23d731a0e08757d0449ca3dd662fd9e6
SHA256 c89c8a2fcf11d8191c7690027055431906aae827fc7f443f0908ad062e7e653e
SHA512 56bafd1c6c77343f724a8430a1f496b4a3160faa9a19ea40796438ae67d6c45f8a13224dcf3d1defb97140a2e47a248dd837801a8cb4674e7890b495aeec538e

\Users\Admin\AppData\Local\Temp\_MEI4562\tk86t.dll

MD5 ef0d7469a88afb64944e2b2d91eb3e7f
SHA1 a26fd3de8da3e4aec417cebfa2de78f9ba7cf05b
SHA256 23a195e1e3922215148e1e09a249b4fe017a73b3564af90b0f6fd4d9e5dda4da
SHA512 909f0b73b64bad84b896a973b58735747d87b5133207cb3d9fa9ce0c026ee59255b7660c43bb86b1ddeef9fbb80b2250719fd379cff7afd9dbec6f6a007ed093

C:\Users\Admin\AppData\Local\Temp\_MEI4562\_overlapped.pyd

MD5 61193e813a61a545e2d366439c1ee22a
SHA1 f404447b0d9bff49a7431c41653633c501986d60
SHA256 c21b50a7bf9dbe1a0768f5030cac378d58705a9fe1f08d953129332beb0fbefc
SHA512 747e4d5ea1bdf8c1e808579498834e1c24641d434546bffdfcf326e0de8d5814504623a3d3729168b0098824c2b8929afc339674b0d923388b9dac66f5d9d996

C:\Users\Admin\AppData\Local\Temp\_MEI4562\_multiprocessing.pyd

MD5 4ccbd87d76af221f24221530f5f035d1
SHA1 d02b989aaac7657e8b3a70a6ee7758a0b258851b
SHA256 c7bbcfe2511fd1b71b916a22ad6537d60948ffa7bde207fefabee84ef53cafb5
SHA512 34d808adac96a66ca434d209f2f151a9640b359b8419dc51ba24477e485685af10c4596a398a85269e8f03f0fc533645907d7d854733750a35bf6c691de37799

C:\Users\Admin\AppData\Local\Temp\_MEI4562\_hashlib.pyd

MD5 b0262bd89a59a3699bfa75c4dcc3ee06
SHA1 eb658849c646a26572dea7f6bfc042cb62fb49dc
SHA256 4adfbbd6366d9b55d902fc54d2b42e7c8c989a83016ed707bd7a302fc3fc7b67
SHA512 2e4b214de3b306e3a16124af434ff8f5ab832aa3eeb1aa0aa9b49b0ada0928dcbb05c57909292fbe3b01126f4cd3fe0dac9cc15eaea5f3844d6e267865b9f7b1

C:\Users\Admin\AppData\Local\Temp\_MEI4562\_decimal.pyd

MD5 f930b7550574446a015bc602d59b0948
SHA1 4ee6ff8019c6c540525bdd2790fc76385cdd6186
SHA256 3b9ad1d2bc9ec03d37da86135853dac73b3fe851b164fe52265564a81eb8c544
SHA512 10b864975945d6504433554f9ff11b47218caa00f809c6bce00f9e4089b862190a4219f659697a4ba5e5c21edbe1d8d325950921e09371acc4410469bd9189ee

C:\Users\Admin\AppData\Local\Temp\_MEI4562\_asyncio.pyd

MD5 209cbcb4e1a16aa39466a6119322343c
SHA1 cdcce6b64ebf11fecff739cbc57e7a98d6620801
SHA256 f7069734d5174f54e89b88d717133bff6a41b01e57f79957ab3f02daa583f9e2
SHA512 5bbc4ede01729e628260cf39df5809624eae795fd7d51a1ed770ed54663955674593a97b78f66dbf6ae268186273840806ed06d6f7877444d32fdca031a9f0da

C:\Users\Admin\AppData\Local\Temp\_MEI4562\VCRUNTIME140_1.dll

MD5 f8dfa78045620cf8a732e67d1b1eb53d
SHA1 ff9a604d8c99405bfdbbf4295825d3fcbc792704
SHA256 a113f192195f245f17389e6ecbed8005990bcb2476ddad33f7c4c6c86327afe5
SHA512 ba7f8b7ab0deb7a7113124c28092b543e216ca08d1cf158d9f40a326fb69f4a2511a41a59ea8482a10c9ec4ec8ac69b70dfe9ca65e525097d93b819d498da371

C:\Users\Admin\AppData\Local\Temp\_MEI4562\unicodedata.pyd

MD5 04f35d7eec1f6b72bab9daf330fd0d6b
SHA1 ecf0c25ba7adf7624109e2720f2b5930cd2dba65
SHA256 be942308d99cc954931fe6f48ed8cc7a57891ccbe99aae728121bcda1fd929ab
SHA512 3da405e4c1371f4b265e744229dcc149491a112a2b7ea8e518d5945f8c259cad15583f25592b35ec8a344e43007ae00da9673822635ee734d32664f65c9c8d9b

C:\Users\Admin\AppData\Local\Temp\_MEI4562\libssl-3.dll

MD5 19a2aba25456181d5fb572d88ac0e73e
SHA1 656ca8cdfc9c3a6379536e2027e93408851483db
SHA256 2e9fbcd8f7fdc13a5179533239811456554f2b3aa2fb10e1b17be0df81c79006
SHA512 df17dc8a882363a6c5a1b78ba3cf448437d1118ccc4a6275cc7681551b13c1a4e0f94e30ffb94c3530b688b62bff1c03e57c2c185a7df2bf3e5737a06e114337

C:\Users\Admin\AppData\Local\Temp\_MEI4562\libcrypto-3.dll

MD5 e547cf6d296a88f5b1c352c116df7c0c
SHA1 cafa14e0367f7c13ad140fd556f10f320a039783
SHA256 05fe080eab7fc535c51e10c1bd76a2f3e6217f9c91a25034774588881c3f99de
SHA512 9f42edf04c7af350a00fa4fdf92b8e2e6f47ab9d2d41491985b20cd0adde4f694253399f6a88f4bdd765c4f49792f25fb01e84ec03fd5d0be8bb61773d77d74d

\Users\Admin\AppData\Local\Temp\_MEI4562\_lzma.pyd

MD5 b71dbe0f137ffbda6c3a89d5bcbf1017
SHA1 a2e2bdc40fdb83cc625c5b5e8a336ca3f0c29c5f
SHA256 6216173194b29875e84963cd4dc4752f7ca9493f5b1fd7e4130ca0e411c8ac6a
SHA512 9a5c7b1e25d8e1b5738f01aedfd468c1837f1ac8dd4a5b1d24ce86dcae0db1c5b20f2ff4280960bc523aee70b71db54fd515047cdaf10d21a8bec3ebd6663358

memory/384-1430-0x0000000000130000-0x0000000000318000-memory.dmp

memory/384-1438-0x0000000000B60000-0x0000000000B7C000-memory.dmp

memory/384-1439-0x000000001AE70000-0x000000001AEC0000-memory.dmp

memory/384-1441-0x0000000002540000-0x0000000002558000-memory.dmp

memory/384-1443-0x0000000000B10000-0x0000000000B1E000-memory.dmp

memory/384-1445-0x0000000002560000-0x000000000256E000-memory.dmp

memory/384-1447-0x0000000002570000-0x000000000257C000-memory.dmp

memory/5016-1448-0x00007FFC6ABA0000-0x00007FFC6ABCA000-memory.dmp

memory/5016-1449-0x00007FFC520B0000-0x00007FFC54166000-memory.dmp

memory/384-1450-0x000000001C0C0000-0x000000001C226000-memory.dmp

memory/384-1504-0x000000001C0C0000-0x000000001C226000-memory.dmp